Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-52999 (GCVE-0-2025-52999)
Vulnerability from cvelistv5 – Published: 2025-06-25 17:02 – Updated: 2025-06-25 18:04- CWE-121 - Stack-based Buffer Overflow
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| FasterXML | jackson-core |
Affected:
< 2.15.0
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-52999",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-25T18:04:07.206576Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-25T18:04:23.296Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "jackson-core",
"vendor": "FasterXML",
"versions": [
{
"status": "affected",
"version": "\u003c 2.15.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "jackson-core contains core low-level incremental (\"streaming\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121: Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-25T17:02:57.428Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
},
{
"name": "https://github.com/FasterXML/jackson-core/pull/943",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/FasterXML/jackson-core/pull/943"
}
],
"source": {
"advisory": "GHSA-h46c-h94j-95f3",
"discovery": "UNKNOWN"
},
"title": "jackson-core Has Potential for StackoverflowError if user parses an input file that contains very deeply nested data"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-52999",
"datePublished": "2025-06-25T17:02:57.428Z",
"dateReserved": "2025-06-24T03:50:36.795Z",
"dateUpdated": "2025-06-25T18:04:23.296Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-52999\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-06-25T17:15:39.820\",\"lastModified\":\"2025-06-26T18:57:43.670\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"jackson-core contains core low-level incremental (\\\"streaming\\\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources.\"},{\"lang\":\"es\",\"value\":\"jackson-core contiene las abstracciones principales del analizador incremental (\\\"streaming\\\") de bajo nivel y del generador utilizadas por Jackson Data Processor. En versiones anteriores a la 2.15.0, si un usuario analiza un archivo de entrada con datos profundamente anidados, Jackson pod\u00eda generar un error de Stackoverflow si la profundidad era excesiva. jackson-core 2.15.0 incluye un l\u00edmite configurable para la profundidad que Jackson recorrer\u00e1 en un documento de entrada, con una profundidad predeterminada de 1000. jackson-core generar\u00e1 una excepci\u00f3n StreamConstraintsException si se alcanza el l\u00edmite. jackson-databind tambi\u00e9n se beneficia de este cambio, ya que utiliza jackson-core para analizar las entradas JSON. Como soluci\u00f3n alternativa, se recomienda a los usuarios evitar analizar archivos de entrada de fuentes no confiables.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]}],\"references\":[{\"url\":\"https://github.com/FasterXML/jackson-core/pull/943\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"jackson-core Has Potential for StackoverflowError if user parses an input file that contains very deeply nested data\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-121\", \"lang\": \"en\", \"description\": \"CWE-121: Stack-based Buffer Overflow\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV4_0\": {\"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"baseScore\": 8.7, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N\", \"version\": \"4.0\"}}], \"references\": [{\"name\": \"https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3\"}, {\"name\": \"https://github.com/FasterXML/jackson-core/pull/943\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/FasterXML/jackson-core/pull/943\"}], \"affected\": [{\"vendor\": \"FasterXML\", \"product\": \"jackson-core\", \"versions\": [{\"version\": \"\u003c 2.15.0\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-06-25T17:02:57.428Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"jackson-core contains core low-level incremental (\\\"streaming\\\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources.\"}], \"source\": {\"advisory\": \"GHSA-h46c-h94j-95f3\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-52999\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-25T18:04:07.206576Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-25T18:04:19.172Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2025-52999\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2025-06-24T03:50:36.795Z\", \"datePublished\": \"2025-06-25T17:02:57.428Z\", \"dateUpdated\": \"2025-06-25T18:04:23.296Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2025-AVI-1000
Vulnerability from certfr_avis - Published: 2025-11-13 - Updated: 2025-11-13
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk | Splunk Enterprise versions 9.4.x antérieures à 9.4.5 | ||
| Splunk | Splunk | Splunk Cloud Platform versions 10.1.2507 antérieures à 10.1.2507.1 | ||
| Splunk | Splunk | Splunk Cloud Platform versions 9.3.2408 antérieures à 9.3.2408.124 | ||
| Splunk | Splunk | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.116 | ||
| Splunk | Splunk | Splunk Enterprise versions 10.0.x antérieures à 10.0.1 | ||
| Splunk | Splunk | Splunk Cloud Platform versions 10.0.2503 antérieures à 10.0.2503.5 | ||
| Splunk | Splunk | Splunk Enterprise versions 9.2.x antérieures à 9.2.9 | ||
| Splunk | Splunk | Splunk Enterprise versions 9.3.x antérieures à 9.3.7 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.5",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.1.2507 ant\u00e9rieures \u00e0 10.1.2507.1",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.124",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.116",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.1",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.0.2503 ant\u00e9rieures \u00e0 10.0.2503.5",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.9",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.7",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-20378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20378"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-20379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20379"
}
],
"initial_release_date": "2025-11-13T00:00:00",
"last_revision_date": "2025-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1000",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9 et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1103",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1103"
},
{
"published_at": "2025-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1102",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1102"
},
{
"published_at": "2025-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1101",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1101"
}
]
}
CERTFR-2025-AVI-1000
Vulnerability from certfr_avis - Published: 2025-11-13 - Updated: 2025-11-13
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk | Splunk Enterprise versions 9.4.x antérieures à 9.4.5 | ||
| Splunk | Splunk | Splunk Cloud Platform versions 10.1.2507 antérieures à 10.1.2507.1 | ||
| Splunk | Splunk | Splunk Cloud Platform versions 9.3.2408 antérieures à 9.3.2408.124 | ||
| Splunk | Splunk | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.116 | ||
| Splunk | Splunk | Splunk Enterprise versions 10.0.x antérieures à 10.0.1 | ||
| Splunk | Splunk | Splunk Cloud Platform versions 10.0.2503 antérieures à 10.0.2503.5 | ||
| Splunk | Splunk | Splunk Enterprise versions 9.2.x antérieures à 9.2.9 | ||
| Splunk | Splunk | Splunk Enterprise versions 9.3.x antérieures à 9.3.7 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.5",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.1.2507 ant\u00e9rieures \u00e0 10.1.2507.1",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.124",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.116",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.1",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.0.2503 ant\u00e9rieures \u00e0 10.0.2503.5",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.9",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.7",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-20378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20378"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-20379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20379"
}
],
"initial_release_date": "2025-11-13T00:00:00",
"last_revision_date": "2025-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1000",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9 et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1103",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1103"
},
{
"published_at": "2025-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1102",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1102"
},
{
"published_at": "2025-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1101",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1101"
}
]
}
CERTFR-2025-AVI-0760
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | User Entity Behavior Analytics pour IBM QRadar SIEM versions antérieures à 5.0.1 | ||
| IBM | Db2 | Db2 on Cloud Pak for Data versions antérieures à v5.2.1 | ||
| IBM | Db2 | Db2 Warehouse on Cloud Pak for Data versions antérieures à v5.2.1 | ||
| IBM | WebSphere | WebSphere Application Server and WebSphere Application Server Liberty, avec les fonctionnalités jsonp sans le dernier correctif de sécurité | ||
| IBM | WebSphere | IBM Common Licensing pour Websphere Liberty ART versions 9.0.x antérieures à 9.0.0.2 | ||
| IBM | WebSphere | IBM Common Licensing pour Websphere Liberty Agent versions 9.0.x antérieures à 9.0.0.2 | ||
| IBM | WebSphere | WebSphere Hybrid Edition version 5.1 sans les correctifs de sécurité APAR PH67137, APAR PH67132, | ||
| IBM | WebSphere | Cloud Pak for Applications versions 5.1 à 5.3 pour WebSphere Application Server Liberty sans les correctifs de sécurité APAR PH67132 et APAR PH67137 | ||
| IBM | WebSphere | IBM Enterprise Application Runtimes pour WebSphere Application Server version 1.0 sans les correctif de sécurité APAR PH67137 et APAR PH67132 | ||
| IBM | WebSphere | Engineering Test Management versions 7.0.2 et 7.0.3 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Engineering Test Management versions 7.1 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Engineering Lifecycle Management 7.0.2 et 7.0.3 pour WebSphere Application Server Liberty versions 17.0.0.3 à 25.0.0.8 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Engineering Lifecycle Management 7.1 pour WebSphere Application Server Liberty versions 17.0.0.3 à 25.0.0.8 sans le dernier correctif de sécurité |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "User Entity Behavior Analytics pour IBM QRadar SIEM versions ant\u00e9rieures \u00e0 5.0.1",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.2.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.2.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server and WebSphere Application Server Liberty, avec les fonctionnalit\u00e9s jsonp sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Common Licensing pour Websphere Liberty ART versions 9.0.x ant\u00e9rieures \u00e0 9.0.0.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Common Licensing pour Websphere Liberty Agent versions 9.0.x ant\u00e9rieures \u00e0 9.0.0.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition version 5.1 sans les correctifs de s\u00e9curit\u00e9 APAR PH67137, APAR PH67132,",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Applications versions 5.1 \u00e0 5.3 pour WebSphere Application Server Liberty sans les correctifs de s\u00e9curit\u00e9 APAR PH67132 et APAR PH67137",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Enterprise Application Runtimes pour WebSphere Application Server version 1.0 sans les correctif de s\u00e9curit\u00e9 APAR PH67137 et APAR PH67132",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Test Management versions 7.0.2 et 7.0.3 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Test Management versions 7.1 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Lifecycle Management 7.0.2 et 7.0.3 pour WebSphere Application Server Liberty versions 17.0.0.3 \u00e0 25.0.0.8 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Lifecycle Management 7.1 pour WebSphere Application Server Liberty versions 17.0.0.3 \u00e0 25.0.0.8 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-31129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2025-0755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0755"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-55565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
},
{
"name": "CVE-2024-51473",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51473"
},
{
"name": "CVE-2015-5237",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46762"
},
{
"name": "CVE-2025-32421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32421"
},
{
"name": "CVE-2016-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4055"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2024-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-30472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30472"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2024-45813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45813"
},
{
"name": "CVE-2022-36364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2025-48050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48050"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-33092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33092"
},
{
"name": "CVE-2024-51479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51479"
},
{
"name": "CVE-2025-1647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1647"
},
{
"name": "CVE-2023-39417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39417"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-11831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2025-33143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33143"
},
{
"name": "CVE-2021-3393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3393"
},
{
"name": "CVE-2025-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2533"
},
{
"name": "CVE-2019-10202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10202"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2025-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36010"
},
{
"name": "CVE-2025-36047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36047"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2022-49846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49846"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2024-8184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8184"
},
{
"name": "CVE-2025-48068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48068"
},
{
"name": "CVE-2024-48949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33114"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2023-22467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22467"
},
{
"name": "CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2019-9193",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9193"
},
{
"name": "CVE-2018-5968",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5968"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2024-56332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56332"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24785"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2023-26133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26133"
},
{
"name": "CVE-2024-6484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6484"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2024-56339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56339"
},
{
"name": "CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"name": "CVE-2022-1552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1552"
},
{
"name": "CVE-2024-49828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49828"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-29927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29927"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2017-18214",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18214"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-36071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36071"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2017-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15095"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2019-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12086"
},
{
"name": "CVE-2024-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6827"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2021-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2022-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2625"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2024-6762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6762"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2024-52894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52894"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-21756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
},
{
"name": "CVE-2018-1000873",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000873"
},
{
"name": "CVE-2023-32305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32305"
},
{
"name": "CVE-2025-47287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47287"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0760",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243927",
"url": "https://www.ibm.com/support/pages/node/7243927"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243923",
"url": "https://www.ibm.com/support/pages/node/7243923"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243924",
"url": "https://www.ibm.com/support/pages/node/7243924"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244012",
"url": "https://www.ibm.com/support/pages/node/7244012"
},
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243659",
"url": "https://www.ibm.com/support/pages/node/7243659"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244002",
"url": "https://www.ibm.com/support/pages/node/7244002"
},
{
"published_at": "2025-08-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243582",
"url": "https://www.ibm.com/support/pages/node/7243582"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243928",
"url": "https://www.ibm.com/support/pages/node/7243928"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243925",
"url": "https://www.ibm.com/support/pages/node/7243925"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244010",
"url": "https://www.ibm.com/support/pages/node/7244010"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243922",
"url": "https://www.ibm.com/support/pages/node/7243922"
},
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243673",
"url": "https://www.ibm.com/support/pages/node/7243673"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243877",
"url": "https://www.ibm.com/support/pages/node/7243877"
}
]
}
CERTFR-2026-AVI-0199
Vulnerability from certfr_avis - Published: 2026-02-24 - Updated: 2026-02-24
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Telco Cloud Platform | Telco Cloud Platform versions 4.x et 5.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Data Services | Tanzu Data Flow versions antérieures à 2.0.2 sur Tanzu Platform | ||
| VMware | Azure Spring Enterprise | Harbor Registry versions antérieures à 2.14.2 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour MySQL versions 2.0.0 sur Kubernetes | ||
| VMware | Cloud Foundation | Cloud Foundation versions 9.x antérieures à 9.0.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | App Metrics versions antérieures à2.3.3 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire versions antérieures à 2.6.1 sur Kubernetes | ||
| VMware | Tanzu Kubernetes Runtime | CredHub Secrets Management pour Tanzu Platform versions antérieures à 1.6.8 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 3.3.1 sur Kubernetes | ||
| VMware | Tanzu Operations Manager | Foundation Core pour Tanzu Platform versions antérieures à 3.2.4 | ||
| VMware | Aria Operations | Aria Operations versions 8.x antérieures à 8.18.6 | ||
| VMware | Tanzu Kubernetes Runtime | cf-mgmt pour Tanzu Platform versions antérieures à 1.0.108 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 9.0.1 | ||
| VMware | Tanzu Kubernetes Runtime | Extended App Support pour Tanzu Platform versions antérieures à 1.0.15 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire Management versions antérieures à 1.4.3 | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.77 | ||
| VMware | Tanzu Kubernetes Runtime | Cloud Native Buildpacks pour Tanzu Platform versions antérieures à 0.6.5 | ||
| VMware | Cloud Foundation | Cloud Foundation versions 4.x et 5.x sans le correctif de sécurité KB92148 | ||
| VMware | Tanzu Kubernetes Runtime | AI Services pour Tanzu Platform versions antérieures à 10.3.4 | ||
| VMware | Tanzu Kubernetes Runtime | Java Buildpack versions antérieures à 4.89.0 | ||
| VMware | Telco Cloud Infrastructure | Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Telco Cloud Platform versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow versions ant\u00e9rieures \u00e0 2.0.2 sur Tanzu Platform",
"product": {
"name": "Tanzu Data Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Harbor Registry versions ant\u00e9rieures \u00e0 2.14.2",
"product": {
"name": "Azure Spring Enterprise",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour MySQL versions 2.0.0 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 9.x ant\u00e9rieures \u00e0 9.0.2.0",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Metrics versions ant\u00e9rieures \u00e02.3.3",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 2.6.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.8",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 3.3.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.4",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Aria Operations versions 8.x ant\u00e9rieures \u00e0 8.18.6",
"product": {
"name": "Aria Operations",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "cf-mgmt pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.108",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 9.0.1",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.15",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Management versions ant\u00e9rieures \u00e0 1.4.3",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.77",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Native Buildpacks pour Tanzu Platform versions ant\u00e9rieures \u00e0 0.6.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB92148",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.89.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Infrastructure",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47219"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2017-16544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16544"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2022-24450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24450"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2020-10750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10750"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41091"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2018-1000517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000517"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10543"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2019-5481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5481"
},
{
"name": "CVE-2025-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26646"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-29222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29222"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-29190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29190"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2018-20679",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20679"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2017-15873",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15873"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-22719",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22719"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-39399",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39399"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2023-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22041"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2023-47090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47090"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2022-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29946"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-30215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30215"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-22036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22036"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2022-26652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26652"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2023-42365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42365"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2025-68146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68146"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2017-15874",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15874"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2026-22721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22721"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2022-48174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48174"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2023-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21835"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41089"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2023-42364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42364"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2019-5747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5747"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2018-1000500",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2026-26014",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26014"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2026-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21941"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2026-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21947"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2019-5443",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5443"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2023-22006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22006"
},
{
"name": "CVE-2019-5435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5435"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2026-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22720"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-42363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42363"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29189"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-24T00:00:00",
"last_revision_date": "2026-02-24T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0199",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37012",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37012"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37001",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37001"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37013",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37013"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37003",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37003"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37023",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37023"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37017",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37017"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37006",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37006"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37024",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37024"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36997",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36997"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37004",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37004"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36947",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37018",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37018"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37005",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37005"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37008",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37008"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37007",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37007"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37020",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37020"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36998",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36998"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37002",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37002"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37021",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37021"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37022",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37022"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37016",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37016"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37019",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37019"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37010",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37010"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37009",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37009"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37000",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37000"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37011",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37011"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37015",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37015"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37014",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37014"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36999",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36999"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-0754
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Gemfire | Tanzu GemFire Management Console versions antérieures à 1.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 7.5.4 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu GemFire Management Console versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.5.4",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0754",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36085"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36086"
}
]
}
CERTFR-2025-AVI-0838
Vulnerability from certfr_avis - Published: 2025-10-02 - Updated: 2025-10-02
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.109 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2406 antérieures à 9.2.2406.123 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2408 antérieures à 9.3.2408.119 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.2.2406 antérieures à 9.2.2406.123 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.0 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.8 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.4 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.6 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2411 antérieures à 9.3.2411.108 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2408 antérieures à 9.3.2408.118 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.111 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.109",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.119",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.0",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.8",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.4",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.108",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.118",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.111",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2015-5237",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
},
{
"name": "CVE-2025-20367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20367"
},
{
"name": "CVE-2024-7553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7553"
},
{
"name": "CVE-2025-20366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20366"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2025-20370",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20370"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20369"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1351"
},
{
"name": "CVE-2025-20371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20371"
},
{
"name": "CVE-2025-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20368"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
}
],
"initial_release_date": "2025-10-02T00:00:00",
"last_revision_date": "2025-10-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0838",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1006",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1006"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1005",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1005"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1002",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1002"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1004",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1004"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1007",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1007"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1003",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1003"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1001",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1001"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-0760
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | User Entity Behavior Analytics pour IBM QRadar SIEM versions antérieures à 5.0.1 | ||
| IBM | Db2 | Db2 on Cloud Pak for Data versions antérieures à v5.2.1 | ||
| IBM | Db2 | Db2 Warehouse on Cloud Pak for Data versions antérieures à v5.2.1 | ||
| IBM | WebSphere | WebSphere Application Server and WebSphere Application Server Liberty, avec les fonctionnalités jsonp sans le dernier correctif de sécurité | ||
| IBM | WebSphere | IBM Common Licensing pour Websphere Liberty ART versions 9.0.x antérieures à 9.0.0.2 | ||
| IBM | WebSphere | IBM Common Licensing pour Websphere Liberty Agent versions 9.0.x antérieures à 9.0.0.2 | ||
| IBM | WebSphere | WebSphere Hybrid Edition version 5.1 sans les correctifs de sécurité APAR PH67137, APAR PH67132, | ||
| IBM | WebSphere | Cloud Pak for Applications versions 5.1 à 5.3 pour WebSphere Application Server Liberty sans les correctifs de sécurité APAR PH67132 et APAR PH67137 | ||
| IBM | WebSphere | IBM Enterprise Application Runtimes pour WebSphere Application Server version 1.0 sans les correctif de sécurité APAR PH67137 et APAR PH67132 | ||
| IBM | WebSphere | Engineering Test Management versions 7.0.2 et 7.0.3 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Engineering Test Management versions 7.1 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Engineering Lifecycle Management 7.0.2 et 7.0.3 pour WebSphere Application Server Liberty versions 17.0.0.3 à 25.0.0.8 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Engineering Lifecycle Management 7.1 pour WebSphere Application Server Liberty versions 17.0.0.3 à 25.0.0.8 sans le dernier correctif de sécurité |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "User Entity Behavior Analytics pour IBM QRadar SIEM versions ant\u00e9rieures \u00e0 5.0.1",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.2.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.2.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server and WebSphere Application Server Liberty, avec les fonctionnalit\u00e9s jsonp sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Common Licensing pour Websphere Liberty ART versions 9.0.x ant\u00e9rieures \u00e0 9.0.0.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Common Licensing pour Websphere Liberty Agent versions 9.0.x ant\u00e9rieures \u00e0 9.0.0.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition version 5.1 sans les correctifs de s\u00e9curit\u00e9 APAR PH67137, APAR PH67132,",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Applications versions 5.1 \u00e0 5.3 pour WebSphere Application Server Liberty sans les correctifs de s\u00e9curit\u00e9 APAR PH67132 et APAR PH67137",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Enterprise Application Runtimes pour WebSphere Application Server version 1.0 sans les correctif de s\u00e9curit\u00e9 APAR PH67137 et APAR PH67132",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Test Management versions 7.0.2 et 7.0.3 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Test Management versions 7.1 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Lifecycle Management 7.0.2 et 7.0.3 pour WebSphere Application Server Liberty versions 17.0.0.3 \u00e0 25.0.0.8 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Lifecycle Management 7.1 pour WebSphere Application Server Liberty versions 17.0.0.3 \u00e0 25.0.0.8 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-31129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2025-0755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0755"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-55565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
},
{
"name": "CVE-2024-51473",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51473"
},
{
"name": "CVE-2015-5237",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46762"
},
{
"name": "CVE-2025-32421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32421"
},
{
"name": "CVE-2016-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4055"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2024-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-30472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30472"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2024-45813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45813"
},
{
"name": "CVE-2022-36364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2025-48050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48050"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-33092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33092"
},
{
"name": "CVE-2024-51479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51479"
},
{
"name": "CVE-2025-1647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1647"
},
{
"name": "CVE-2023-39417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39417"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-11831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2025-33143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33143"
},
{
"name": "CVE-2021-3393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3393"
},
{
"name": "CVE-2025-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2533"
},
{
"name": "CVE-2019-10202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10202"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2025-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36010"
},
{
"name": "CVE-2025-36047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36047"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2022-49846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49846"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2024-8184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8184"
},
{
"name": "CVE-2025-48068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48068"
},
{
"name": "CVE-2024-48949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33114"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2023-22467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22467"
},
{
"name": "CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2019-9193",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9193"
},
{
"name": "CVE-2018-5968",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5968"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2024-56332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56332"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24785"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2023-26133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26133"
},
{
"name": "CVE-2024-6484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6484"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2024-56339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56339"
},
{
"name": "CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"name": "CVE-2022-1552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1552"
},
{
"name": "CVE-2024-49828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49828"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-29927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29927"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2017-18214",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18214"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-36071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36071"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2017-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15095"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2019-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12086"
},
{
"name": "CVE-2024-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6827"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2021-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2022-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2625"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2024-6762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6762"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2024-52894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52894"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-21756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
},
{
"name": "CVE-2018-1000873",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000873"
},
{
"name": "CVE-2023-32305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32305"
},
{
"name": "CVE-2025-47287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47287"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0760",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243927",
"url": "https://www.ibm.com/support/pages/node/7243927"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243923",
"url": "https://www.ibm.com/support/pages/node/7243923"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243924",
"url": "https://www.ibm.com/support/pages/node/7243924"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244012",
"url": "https://www.ibm.com/support/pages/node/7244012"
},
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243659",
"url": "https://www.ibm.com/support/pages/node/7243659"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244002",
"url": "https://www.ibm.com/support/pages/node/7244002"
},
{
"published_at": "2025-08-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243582",
"url": "https://www.ibm.com/support/pages/node/7243582"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243928",
"url": "https://www.ibm.com/support/pages/node/7243928"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243925",
"url": "https://www.ibm.com/support/pages/node/7243925"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244010",
"url": "https://www.ibm.com/support/pages/node/7244010"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243922",
"url": "https://www.ibm.com/support/pages/node/7243922"
},
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243673",
"url": "https://www.ibm.com/support/pages/node/7243673"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243877",
"url": "https://www.ibm.com/support/pages/node/7243877"
}
]
}
CERTFR-2025-AVI-0754
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Gemfire | Tanzu GemFire Management Console versions antérieures à 1.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 7.5.4 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu GemFire Management Console versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.5.4",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0754",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36085"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36086"
}
]
}
CERTFR-2025-AVI-0838
Vulnerability from certfr_avis - Published: 2025-10-02 - Updated: 2025-10-02
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.109 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2406 antérieures à 9.2.2406.123 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2408 antérieures à 9.3.2408.119 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.2.2406 antérieures à 9.2.2406.123 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.0 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.8 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.4 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.6 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2411 antérieures à 9.3.2411.108 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2408 antérieures à 9.3.2408.118 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.111 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.109",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.119",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.0",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.8",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.4",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.108",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.118",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.111",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2015-5237",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
},
{
"name": "CVE-2025-20367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20367"
},
{
"name": "CVE-2024-7553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7553"
},
{
"name": "CVE-2025-20366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20366"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2025-20370",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20370"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20369"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1351"
},
{
"name": "CVE-2025-20371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20371"
},
{
"name": "CVE-2025-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20368"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
}
],
"initial_release_date": "2025-10-02T00:00:00",
"last_revision_date": "2025-10-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0838",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1006",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1006"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1005",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1005"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1002",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1002"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1004",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1004"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1007",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1007"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1003",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1003"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1001",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1001"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
RHSA-2025:14127
Vulnerability from csaf_redhat - Published: 2025-08-20 04:16 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14127",
"url": "https://access.redhat.com/errata/RHSA-2025:14127"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14127.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:25+00:00",
"generator": {
"date": "2026-03-18T20:51:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:14127",
"initial_release_date": "2025-08-20T04:16:28+00:00",
"revision_history": [
{
"date": "2025-08-20T04:16:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T04:16:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-4.0-api@9.0.7-16.module%2Bel8.2.0%2B23390%2B7631bd3f.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.7-16.module%2Bel8.2.0%2B23390%2B7631bd3f.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-3.module%2Bel8.2.0%2B23401%2B65186842?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.7-16.module%2Bel8.2.0%2B23390%2B7631bd3f.2?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-3.module%2Bel8.2.0%2B23401%2B65186842?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T04:16:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14127"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-0:69-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.2.0+23390+7631bd3f.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-1:9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-0:3.0.26-3.module+el8.2.0+23401+65186842.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:3467
Vulnerability from csaf_redhat - Published: 2025-04-01 13:06 - Updated: 2026-03-20 01:39A flaw was found in Netty. An unsafe reading of the environment file could potentially cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crashes.
A flaw was found in the createTempFile method of hornetq. Affected version of hornetq allows attackers to arbitrarily overwrite files or access sensitive information.
A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.
A flaw was found in Netty's SslHandler. This vulnerability allows a native crash via a specially crafted packet that bypasses proper validation.
A flaw was found in Netty. An unsafe reading of the environment file could cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crash.
A flaw was found in Apache Commons BeanUtils. This vulnerability allows remote attackers to execute arbitrary code via uncontrolled access to the declaredClass property on Java enum objects, which can expose the class loader when property paths are passed from external sources to methods like getProperty() or getNestedProperty().
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 5 November 2025]\nThe Synopsis was updated to fix a typo in the product version (7.4.21). No other changes have been made.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4.\n\nSecurity Fix(es):\n\n* io.netty/netty: Denial of Service attack on windows app using Netty (CVE-2024-47535)\n\n* netty-common: Denial of Service attack on windows app using Netty (CVE-2025-25193)\n\n* io.netty/netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine (CVE-2025-24970)\n\n* org.wildfly.core/wildfly-server: Wildfly improper RBAC permission (CVE-2025-23367)\n\n* hornetq-core-client: Arbitrarily overwrite files or access sensitive information Security (CVE-2024-51127)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:3467",
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2323697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323697"
},
{
"category": "external",
"summary": "2325538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325538"
},
{
"category": "external",
"summary": "2337620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337620"
},
{
"category": "external",
"summary": "2344787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344787"
},
{
"category": "external",
"summary": "2344788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344788"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3467.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.21 security update",
"tracking": {
"current_release_date": "2026-03-20T01:39:41+00:00",
"generator": {
"date": "2026-03-20T01:39:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:3467",
"initial_release_date": "2025-04-01T13:06:47+00:00",
"revision_history": [
{
"date": "2025-04-01T13:06:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-11-05T13:55:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-20T01:39:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product_id": "Red Hat JBoss Enterprise Application Platform 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47535",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-11-12T16:01:18.772613+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2325538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty. An unsafe reading of the environment file could potentially cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: Denial of Service attack on windows app using Netty",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47535"
},
{
"category": "external",
"summary": "RHBZ#2325538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47535"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/fbf7a704a82e7449b48bd0bbb679f5661c6d61a3",
"url": "https://github.com/netty/netty/commit/fbf7a704a82e7449b48bd0bbb679f5661c6d61a3"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv",
"url": "https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv"
}
],
"release_date": "2024-11-12T15:50:08.334000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: Denial of Service attack on windows app using Netty"
},
{
"cve": "CVE-2024-51127",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2024-11-04T18:00:59.553511+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323697"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the createTempFile method of hornetq. Affected version of hornetq allows attackers to arbitrarily overwrite files or access sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hornetq-core-client: Arbitrarily overwrite files or access sensitive information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-51127"
},
{
"category": "external",
"summary": "RHBZ#2323697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-51127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51127"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-51127",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-51127"
},
{
"category": "external",
"summary": "http://hornetq.com",
"url": "http://hornetq.com"
},
{
"category": "external",
"summary": "https://github.com/JAckLosingHeart/CWE-378/blob/main/CVE-2024-51127.md",
"url": "https://github.com/JAckLosingHeart/CWE-378/blob/main/CVE-2024-51127.md"
}
],
"release_date": "2024-11-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "There is currently no known mitigation for this vulnerability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hornetq-core-client: Arbitrarily overwrite files or access sensitive information"
},
{
"acknowledgments": [
{
"names": [
"Claudia Bartolini",
"Marco Ventura",
"Massimiliano Brolli"
],
"organization": "TIM S.p.A"
}
],
"cve": "CVE-2025-23367",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2025-01-14T14:56:46.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2337620"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. \nThe vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.wildfly.core:wildfly-server: Wildfly improper RBAC permission",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has evaluated this issue and the attacker must be authenticated as a user that belongs to the \"Monitor\" or \"Auditor\" management groups. It requires previous privileges to jeopardize an environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-23367"
},
{
"category": "external",
"summary": "RHBZ#2337620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-23367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-23367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23367"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-qr6x-62gq-4ccp",
"url": "https://github.com/advisories/GHSA-qr6x-62gq-4ccp"
}
],
"release_date": "2025-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.wildfly.core:wildfly-server: Wildfly improper RBAC permission"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-02-10T23:00:52.785132+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344787"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s SslHandler. This vulnerability allows a native crash via a specially crafted packet that bypasses proper validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "io.netty:netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Netty\u0027s SslHandler is of important severity rather than moderate because it directly impacts the stability and reliability of applications using native SSLEngine. By sending a specially crafted packet, an attacker can trigger a native crash, leading to a complete process termination. Unlike typical moderate vulnerabilities that might cause limited disruptions or require specific conditions, this flaw can be exploited remotely to induce a Denial of Service (DoS), affecting high-availability systems and mission-critical services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24970"
},
{
"category": "external",
"summary": "RHBZ#2344787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24970"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4",
"url": "https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw",
"url": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw"
}
],
"release_date": "2025-02-10T21:57:28.730000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "io.netty:netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine"
},
{
"cve": "CVE-2025-25193",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-02-10T23:00:54.794769+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty. An unsafe reading of the environment file could cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: Denial of Service attack on windows app using Netty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects Windows environments, therefore, this would affect an environment when running a supported Red Hat JBoss EAP 7 or 8, for example, if running on Windows.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-25193"
},
{
"category": "external",
"summary": "RHBZ#2344788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-25193",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25193"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386",
"url": "https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx",
"url": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx"
}
],
"release_date": "2025-02-10T22:02:17.197000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "Currently, no mitigation is available for this vulnerability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: Denial of Service attack on windows app using Netty"
},
{
"cve": "CVE-2025-48734",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2025-05-28T14:00:56.619771+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2368956"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Commons BeanUtils. This vulnerability allows remote attackers to execute arbitrary code via uncontrolled access to the declaredClass property on Java enum objects, which can expose the class loader when property paths are passed from external sources to methods like getProperty() or getNestedProperty().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum\u0027s declaredClass property by default",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because a flaw exists in Apache Commons BeanUtils, where PropertyUtilsBean and BeanUtilsBean allow uncontrolled access to the declaredClass property of Java enum objects. Applications that pass untrusted property paths directly to getProperty() or getNestedProperty() methods are at risk, as attackers can exploit this behavior to retrieve the ClassLoader instance and execute arbitrary code in the context of the affected application. This issue leads to compromise of confidentiality, integrity, and availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48734"
},
{
"category": "external",
"summary": "RHBZ#2368956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368956"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48734"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-wxr5-93ph-8wr9",
"url": "https://github.com/advisories/GHSA-wxr5-93ph-8wr9"
},
{
"category": "external",
"summary": "https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc",
"url": "https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9",
"url": "https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/28/6",
"url": "https://www.openwall.com/lists/oss-security/2025/05/28/6"
}
],
"release_date": "2025-05-28T13:32:08.300000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum\u0027s declaredClass property by default"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:10118
Vulnerability from csaf_redhat - Published: 2025-07-01 16:36 - Updated: 2026-03-18 20:51A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.
A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.
A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP\nTools 4.12. Red Hat Product Security has rated this update as having a\nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10118",
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10118.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.12 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:22+00:00",
"generator": {
"date": "2026-03-18T20:51:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:10118",
"initial_release_date": "2025-07-01T16:36:58+00:00",
"revision_history": [
{
"date": "2025-07-01T16:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T16:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.12",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.12::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750932984-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750932984-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750932984-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.12.1750933270-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750932984-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.12.1750933270-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750932984-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:15847
Vulnerability from csaf_redhat - Published: 2025-09-15 16:27 - Updated: 2026-03-20 01:32A vulnerability was found in HashiCorp Consul. Due to a lack of path normalization, URL paths in L7 traffic intentions can be exploited to bypass permissions defined in the intentions.
A flaw was found in HashiCorp Consul and Consul Enterprise. The server response does not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and can lead to reflected cross-site scripting (XSS).
A flaw was found in quic-go. This issue may allow an attacker to trigger a denial of service by sending a large number of NEW_CONNECTION_ID frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a RETIRE_CONNECTION_ID frame, but the attacker can prevent the receiver from sending out the vast majority of these RETIRE_CONNECTION_ID frames by selectively acknowledging received packets and collapsing the peers congestion window and by manipulating the peer's RTT estimate.
A flaw was found in Golang. The ZIP implementation of the Go language archive/zip library behaves differently than the rest of the ZIP file format implementations. When handling ZIP files with a corrupted central directory record, the library skips over the invalid record and processes the next valid one. This flaw allows a malicious user to access hidden information or files inside maliciously crafted ZIP files.
An improper handling of exceptional conditions vulnerability was found in Traefik. In affected versions, sending a GET request to any Traefik endpoint with the "Content-length" request header results in an indefinite hang with the default configuration, resulting in a denial of service.
An authorization bypass vulnerability was found in Traefik. This flaw allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses.
A flaw was found in golang.org/x/net/html. This flaw allows an attacker to craft input to the parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This issue can cause a denial of service.
An improper input validation vulnerability was found in the cipher-base npm package. Missing input type checks in the polyfill of the Node.js `createHash` function result in invalid value calculations, hanging and rewinding the hash state, including turning a tagged hash into an untagged hash, for malicious JSON-stringifyable inputs.
A vulnerability was found in sha.js, where the hashing implementation does not perform sufficient input type validation. The .update() function accepts arbitrary objects, including those with crafted length properties, which can alter the internal state machine of the hashing process. This flaw may result in unexpected behavior such as rewinding the hash state, producing inconsistent digest outputs, or entering invalid processing loops. The issue was introduced due to the reliance on JavaScript object coercion rules rather than enforcing strict buffer or string inputs.
A bundled uri handling flaw was found in Git. When cloning a repository, Git knows to optionally fetch a bundle advertised by the remote server, which allows the server side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.
A flaw was found in tar-fs. This vulnerability allows files to be written outside the intended extraction directory via specially crafted tar archives. The issue arises from insufficient path validation during tarball extraction, potentially enabling path traversal attacks that can overwrite arbitrary files on the system.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Dev Spaces 3.23.0 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Dev Spaces provides a cloud developer workspace server and a browser-based IDE built for teams and organizations. Dev Spaces runs in OpenShift and is well-suited for container-based development. The 3.23 release is based on Eclipse Che 7.107 and uses the DevWorkspace engine to provide support for workspaces based on devfile v2.1 and v2.2. Users still using the v1 standard should migrate as soon as possible. https://devfile.io/docs/2.2.0/migrating-to-devfile-v2 Dev Spaces supports OpenShift EUS releases v4.14 and higher. Users are expected to update to supported OpenShift releases in order to continue to get Dev Spaces updates. https://access.redhat.com/support/policy/updates/openshift#crw",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15847",
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_dev_spaces/3.23/html/administration_guide/installing-devspaces",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_dev_spaces/3.23/html/administration_guide/installing-devspaces"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-10005",
"url": "https://access.redhat.com/security/cve/CVE-2024-10005"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-10006",
"url": "https://access.redhat.com/security/cve/CVE-2024-10006"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-22189",
"url": "https://access.redhat.com/security/cve/CVE-2024-22189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-24789",
"url": "https://access.redhat.com/security/cve/CVE-2024-24789"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-28869",
"url": "https://access.redhat.com/security/cve/CVE-2024-28869"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-39321",
"url": "https://access.redhat.com/security/cve/CVE-2024-39321"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-45338",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-48385",
"url": "https://access.redhat.com/security/cve/CVE-2025-48385"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-48387",
"url": "https://access.redhat.com/security/cve/CVE-2025-48387"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52999",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9287",
"url": "https://access.redhat.com/security/cve/CVE-2025-9287"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9288",
"url": "https://access.redhat.com/security/cve/CVE-2025-9288"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15847.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.23.0 Release.",
"tracking": {
"current_release_date": "2026-03-20T01:32:40+00:00",
"generator": {
"date": "2026-03-20T01:32:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:15847",
"initial_release_date": "2025-09-15T16:27:40+00:00",
"revision_history": [
{
"date": "2025-09-15T16:27:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-15T16:27:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-20T01:32:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product": {
"name": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_devspaces:3.23::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Dev Spaces (RHOSDS)"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757618807"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3Ad2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756506343"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757019057"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"product": {
"name": "registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"product_id": "registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/idea-rhel9@sha256%3Adf24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e?arch=amd64\u0026repository_url=registry.redhat.io/devspaces-tech-preview\u0026tag=3.23-1756504289"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3Aa69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756507311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"product": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"product_id": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Aac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8?arch=amd64\u0026repository_url=registry.redhat.io/devspaces-tech-preview\u0026tag=3.23-1757019334"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3Ad23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756509551"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3A6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757017659"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756828766"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"product_id": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-operator-bundle@sha256%3Aa48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757629825"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757367052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756753588"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756504388"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3A65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757028609"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3A42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757037884"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757618807"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756506343"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757019057"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756507311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"product": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"product_id": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Acd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85?arch=s390x\u0026repository_url=registry.redhat.io/devspaces-tech-preview\u0026tag=3.23-1757019334"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3Ae32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756509551"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3A1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757017659"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756828766"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3Af2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757367052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756753588"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756504388"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3Aa4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757028609"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3Ab60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757037884"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757618807"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756506343"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757019057"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3Aad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756507311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"product_id": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3A0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces-tech-preview\u0026tag=3.23-1757019334"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756509551"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3Ae762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757017659"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756828766"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757367052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3Afa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756753588"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3Aa152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756504388"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3Acc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757028609"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3Aee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757037884"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757618807"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756506343"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757019057"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3Ac9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756507311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"product": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"product_id": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Ad0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d?arch=arm64\u0026repository_url=registry.redhat.io/devspaces-tech-preview\u0026tag=3.23-1757019334"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756509551"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3A15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757017659"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3Af5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756828766"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3Acc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757367052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756753588"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3Af17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1756504388"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3A53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757028609"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"product": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"product_id": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"product_identification_helper": {
"purl": "pkg:oci/udi-base-rhel9@sha256%3Aa86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=3.23-1757037884"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64"
},
"product_reference": "registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64"
},
"product_reference": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x"
},
"product_reference": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64"
},
"product_reference": "registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.23",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.23"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-10005",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2024-10-30T22:00:40.599537+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2322857"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in HashiCorp Consul. Due to a lack of path normalization, URL paths in L7 traffic intentions can be exploited to bypass permissions defined in the intentions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hashicorp/consul: consul: Consul L7 Intentions Vulnerable To URL Path Bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because the lack of path normalization in HashiCorp Consul allows attackers to exploit URL paths in L7 traffic intentions, bypassing defined permissions. This can compromise both confidentiality and integrity, enabling unauthorized access to sensitive data and resources, highlighting the need for immediate attention.\n\nThis CVE has been rated \"Low\" as RH does not use Consul/Consul Catalog as a provider for configuration discovery in Traefik Proxy. Even though the product is affected, RH products are not vulnerable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-10005"
},
{
"category": "external",
"summary": "RHBZ#2322857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322857"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-10005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10005"
},
{
"category": "external",
"summary": "https://discuss.hashicorp.com/t/hcsec-2024-22-consul-l7-intentions-vulnerable-to-url-path-bypass",
"url": "https://discuss.hashicorp.com/t/hcsec-2024-22-consul-l7-intentions-vulnerable-to-url-path-bypass"
}
],
"release_date": "2024-10-30T21:19:22.576000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hashicorp/consul: consul: Consul L7 Intentions Vulnerable To URL Path Bypass"
},
{
"cve": "CVE-2024-10006",
"cwe": {
"id": "CWE-644",
"name": "Improper Neutralization of HTTP Headers for Scripting Syntax"
},
"discovery_date": "2024-10-30T22:00:44.245072+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2322858"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in HashiCorp Consul and Consul Enterprise. The server response does not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and can lead to reflected cross-site scripting (XSS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hashicorp/consul: consul: Consul L7 Intentions Vulnerable To Headers Bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because HashiCorp Consul fails to set a Content-Type HTTP header, allowing user inputs to be misinterpreted and potentially leading to reflected cross-site scripting (XSS). This can compromise both confidentiality and integrity, posing a risk to user data and application security, which requires prompt remediation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-10006"
},
{
"category": "external",
"summary": "RHBZ#2322858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322858"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-10006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10006"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10006",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10006"
},
{
"category": "external",
"summary": "https://discuss.hashicorp.com/t/hcsec-2024-23-consul-l7-intentions-vulnerable-to-headers-bypass",
"url": "https://discuss.hashicorp.com/t/hcsec-2024-23-consul-l7-intentions-vulnerable-to-headers-bypass"
}
],
"release_date": "2024-10-30T21:20:37.011000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hashicorp/consul: consul: Consul L7 Intentions Vulnerable To Headers Bypass"
},
{
"cve": "CVE-2024-22189",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-04-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273513"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in quic-go. This issue may allow an attacker to trigger a denial of service by sending a large number of NEW_CONNECTION_ID frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a RETIRE_CONNECTION_ID frame, but the attacker can prevent the receiver from sending out the vast majority of these RETIRE_CONNECTION_ID frames by selectively acknowledging received packets and collapsing the peers congestion window and by manipulating the peer\u0027s RTT estimate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "quic-go: memory exhaustion attack against QUIC\u0027s connection ID mechanism",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-22189"
},
{
"category": "external",
"summary": "RHBZ#2273513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273513"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-22189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22189"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22189",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22189"
},
{
"category": "external",
"summary": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a",
"url": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a"
},
{
"category": "external",
"summary": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478",
"url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478"
},
{
"category": "external",
"summary": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management",
"url": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management"
}
],
"release_date": "2024-04-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "quic-go: memory exhaustion attack against QUIC\u0027s connection ID mechanism"
},
{
"cve": "CVE-2024-24789",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-06-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2292668"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The ZIP implementation of the Go language archive/zip library behaves differently than the rest of the ZIP file format implementations. When handling ZIP files with a corrupted central directory record, the library skips over the invalid record and processes the next valid one. This flaw allows a malicious user to access hidden information or files inside maliciously crafted ZIP files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Incorrect handling of certain ZIP files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24789"
},
{
"category": "external",
"summary": "RHBZ#2292668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24789"
}
],
"release_date": "2024-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Incorrect handling of certain ZIP files"
},
{
"cve": "CVE-2024-28869",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"discovery_date": "2024-04-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2274987"
}
],
"notes": [
{
"category": "description",
"text": "An improper handling of exceptional conditions vulnerability was found in Traefik. In affected versions, sending a GET request to any Traefik endpoint with the \"Content-length\" request header results in an indefinite hang with the default configuration, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "traefik: denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-28869"
},
{
"category": "external",
"summary": "RHBZ#2274987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274987"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-28869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28869"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6",
"url": "https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw",
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw"
}
],
"release_date": "2024-04-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "traefik: denial of service"
},
{
"cve": "CVE-2024-39321",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"discovery_date": "2024-07-05T18:20:25+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2296009"
}
],
"notes": [
{
"category": "description",
"text": "An authorization bypass vulnerability was found in Traefik. This flaw allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "traefik: Bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability in Traefik that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes, while notable, is categorized as moderate severity rather than important. This classification stems from the requirement for an attacker to leverage HTTP/3\u0027s early data feature and perform spoofed IP address manipulation to exploit the flaw. As a result, successful exploitation demands specific conditions, including network-level access and manipulation capabilities, which may not be trivial in many environments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39321"
},
{
"category": "external",
"summary": "RHBZ#2296009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39321"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/releases/tag/v2.11.6",
"url": "https://github.com/traefik/traefik/releases/tag/v2.11.6"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/releases/tag/v3.0.4",
"url": "https://github.com/traefik/traefik/releases/tag/v3.0.4"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3",
"url": "https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3"
},
{
"category": "external",
"summary": "https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9",
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9"
}
],
"release_date": "2024-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "traefik: Bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes"
},
{
"cve": "CVE-2024-45338",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-12-18T21:00:59.938173+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org/x/net/html. This flaw allows an attacker to craft input to the parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This issue can cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as an Important severity because an attacker can craft malicious input that causes the parsing functions to process data non-linearly, resulting in significant delays which leads to a denial of service by exhausting system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "RHBZ#2333122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://go.dev/cl/637536",
"url": "https://go.dev/cl/637536"
},
{
"category": "external",
"summary": "https://go.dev/issue/70906",
"url": "https://go.dev/issue/70906"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ",
"url": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3333",
"url": "https://pkg.go.dev/vuln/GO-2024-3333"
}
],
"release_date": "2024-12-18T20:38:22.660000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html"
},
{
"cve": "CVE-2025-9287",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-08-20T22:00:53.821394+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2389932"
}
],
"notes": [
{
"category": "description",
"text": "An improper input validation vulnerability was found in the cipher-base npm package. Missing input type checks in the polyfill of the Node.js `createHash` function result in invalid\u00a0value calculations,\u00a0hanging and\u00a0rewinding the\u00a0hash state, including\u00a0turning a tagged hash\u00a0into an untagged\u00a0hash, for malicious JSON-stringifyable\u00a0inputs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cipher-base: Cipher-base hash manipulation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9287"
},
{
"category": "external",
"summary": "RHBZ#2389932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2389932"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9287"
},
{
"category": "external",
"summary": "https://github.com/browserify/cipher-base/pull/23",
"url": "https://github.com/browserify/cipher-base/pull/23"
},
{
"category": "external",
"summary": "https://github.com/browserify/cipher-base/security/advisories/GHSA-cpq7-6gpm-g9rc",
"url": "https://github.com/browserify/cipher-base/security/advisories/GHSA-cpq7-6gpm-g9rc"
}
],
"release_date": "2025-08-20T21:43:56.548000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cipher-base: Cipher-base hash manipulation"
},
{
"cve": "CVE-2025-9288",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-08-20T23:00:56.263191+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2389980"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in sha.js, where the hashing implementation does not perform sufficient input type validation. The .update() function accepts arbitrary objects, including those with crafted length properties, which can alter the internal state machine of the hashing process. This flaw may result in unexpected behavior such as rewinding the hash state, producing inconsistent digest outputs, or entering invalid processing loops. The issue was introduced due to the reliance on JavaScript object coercion rules rather than enforcing strict buffer or string inputs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sha.js: Missing type checks leading to hash rewind and passing on crafted data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important rather then Critical because while the lack of input type checks in sha.js allows for hash state rewinding, crafted collisions, and potential denial of service, the vulnerability requires highly specific crafted input objects that are unlikely to occur in typical real-world usage, especially since most applications pass well-formed strings or buffers to hashing functions. Moreover, the cryptographic breakages described, such as nonce reuse leading to private key extraction, are indirect and depend on downstream libraries misusing sha.js for sensitive operations without additional validation layers. As a result, the flaw significantly undermines correctness and robustness of the hashing API, but its exploitability in common production systems is constrained, which could justify viewing it as an Important vulnerability rather than a Critical one.\n\n\nThe flaw requires applications to pass attacker-controlled, non-standard JavaScript objects into hash.update(). Most real-world Node.js applications and libraries already use Buffer, TypedArray, or String inputs, which are unaffected. Furthermore, Node\u2019s built-in crypto module, which is widely adopted, enforces stricter type-checking and is not impacted. As a result, the vulnerability mainly threatens projects that (a) directly depend on sha.js for cryptographically sensitive operations, and (b) hash untrusted input without type validation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9288"
},
{
"category": "external",
"summary": "RHBZ#2389980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2389980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9288",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9288"
},
{
"category": "external",
"summary": "https://github.com/browserify/sha.js/pull/78",
"url": "https://github.com/browserify/sha.js/pull/78"
},
{
"category": "external",
"summary": "https://github.com/browserify/sha.js/security/advisories/GHSA-95m3-7q98-8xr5",
"url": "https://github.com/browserify/sha.js/security/advisories/GHSA-95m3-7q98-8xr5"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9287"
}
],
"release_date": "2025-08-20T21:59:44.728000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sha.js: Missing type checks leading to hash rewind and passing on crafted data"
},
{
"cve": "CVE-2025-48385",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2025-07-08T19:00:55.106787+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2378808"
}
],
"notes": [
{
"category": "description",
"text": "A bundled uri handling flaw was found in Git. When cloning a repository, Git knows to optionally fetch a bundle advertised by the remote server, which allows the server side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "git: Git arbitrary file writes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Important rather than a Moderate flaw because it enables protocol injection at the transport layer of Git\u0027s bundle-uri mechanism, allowing a remote server to manipulate how and where data is written on the client system during a clone operation. The lack of input sanitization on user-controlled values like the URI and target path means that malformed inputs containing spaces or newlines can break protocol framing, leading to arbitrary file writes. In scenarios such as CI pipelines, developer environments, or recursive clones with submodules, an attacker can exploit this to overwrite critical files or inject malicious content, potentially achieving remote code execution (RCE).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48385"
},
{
"category": "external",
"summary": "RHBZ#2378808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378808"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48385"
},
{
"category": "external",
"summary": "https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655",
"url": "https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655"
}
],
"release_date": "2025-07-08T18:23:44.405000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "git: Git arbitrary file writes"
},
{
"cve": "CVE-2025-48387",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-06-02T20:00:45.526571+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2369875"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in tar-fs. This vulnerability allows files to be written outside the intended extraction directory via specially crafted tar archives. The issue arises from insufficient path validation during tarball extraction, potentially enabling path traversal attacks that can overwrite arbitrary files on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tar-fs: tar-fs has issue where extract can write outside the specified dir with a specific tarball",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in tar-fs is Important not a moderate flaw, primarily due to its ability to bypass directory confinement during tarball extraction. The core issue\u2014path traversal via crafted archive entries\u2014allows attackers to write files outside the intended extraction directory, potentially overwriting system files, configuration files, or injecting malicious scripts into sensitive locations. Unlike moderate flaws that may require specific conditions or user interaction to exploit, this vulnerability can be triggered automatically in server-side environments that extract user-supplied tar files (e.g., CI/CD systems, deployment tools, or file upload handlers). Its exploitation could lead to remote code execution, privilege escalation, or denial of service, depending on the context.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48387"
},
{
"category": "external",
"summary": "RHBZ#2369875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369875"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48387"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48387",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48387"
},
{
"category": "external",
"summary": "https://github.com/mafintosh/tar-fs/commit/647447b572bc135c41035e82ca7b894f02b17f0f",
"url": "https://github.com/mafintosh/tar-fs/commit/647447b572bc135c41035e82ca7b894f02b17f0f"
},
{
"category": "external",
"summary": "https://github.com/mafintosh/tar-fs/security/advisories/GHSA-8cj5-5rvv-wf4v",
"url": "https://github.com/mafintosh/tar-fs/security/advisories/GHSA-8cj5-5rvv-wf4v"
}
],
"release_date": "2025-06-02T19:20:18.220000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tar-fs: tar-fs has issue where extract can write outside the specified dir with a specific tarball"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T16:27:40+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15847"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/idea-rhel9@sha256:df24ebb239a2cc0d4543309f51a7268c7d524d428a536e0b3443c51089c3f87e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:0dc291e3dc58d285d054a35b480d14c3912777e14fd643915b8ceabd178ad6bf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:ac5b3e78470c747377dbc9ecb6e0680d724086c331955ed5471b74d01155ece8_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:cd1ee1d15cafe77bbf8e283cee2cde88dcdfb59c9545867a047cf4b42089aa85_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces-tech-preview/jetbrains-ide-rhel9@sha256:d0b17cb5f9a530ca959058fe926b3f5c42539487e23587d51948f49d7a38cf5d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:2bfe5265856abdd8cb490bde852d4e992f1793684f003d1ef53776fe69d790d7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:32d9568317c55235f75c4d0e1c98de6d4af252cbdd116ed2355025cbaeac862f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:48b99d167a5c54a98e69bba441bb5b70db2ffe065d3f8f8d23ecfed7b813336e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/code-rhel9@sha256:8b2b33e91756bbd1c7ed6905e00176b9d55a4e13aee2f84862bc571a8a82f113_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:43cdf063e9a6aa5f84233c8bd850a711b5d5fae8a7795803609fec07d189ca05_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:7ad9073c0a768f170cf8d4311ea35ec1caccfdefdf6d1dccbc10ed01cdeafd16_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:934c224a59086c689be1839b6846a0984370a78a8adc8510fa692f5215bb6182_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/configbump-rhel9@sha256:d2bfcb27baf36e569eca4f7c85f458a180d7938616413a4cf8e10cb329e6a150_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:78dabed4a5fc1eb3246778e6ee6e1a543829cf88d0b03f0ccccf101c41a7bdda_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:7c98501fee1297a24caa77d325f6bfd7f91192589f0aa22d47d9766e8219c749_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:905d45518e20ea10daa3a35ea2f2201a6f762a16f9b4829ce37b7396d493ac59_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/dashboard-rhel9@sha256:91e064bccc3f7320844763fc136cb4c650db40190e01edebe16135bcc00627ac_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:a48dd94d5616183843ba939146b7e4d985210cdd902038ff80ff6df3df3d74ca_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:2b18f2cf31e0914762cc6e99c9797c24a19db69ca08bc9983bc2aacc85ee7024_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:38c9b56aa9c2a5153e01ffc1edb399247ed1937b9382ac4f0fb2beae4c27f69a_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:59f85768c28401783b9475ce21088e3d8fbf6bcd64bb49e3a243c881ac6b546c_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:f5b515ecaea7d542ac18ea5a056c99fe84ca2ac25fa3904bdc50a78ecf47541f_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8cdf016c4d61bce4f244415ae192fe1647ef517ba1690f2009b5b8e1104c72a7_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:a69c6f8b091d11c69b6864edc6973c6f5f4515eb3a1923bf51fdb971315c28b0_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:ad5f4d1b7f712416bb62785375ce15ef1a5cb3f1a77226899abc8aba32a11623_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:c9808efcb221c10d78bdf663e3b5e3d5d281bf59702be049090fc1fa0511b078_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:13f0ec3ce663f6701501e82bbb508549e149588eedb0982729a59d98c88d0ba0_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:43d9679eb3ac8d5287863137f2d698d814a2fbc2fbd6a6aacba11240cd76d40c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:d23a4d9f0967f53d15fefda63e972e035d23aebe819dd11a6cec9beceacd8997_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e32fc2e1c50fb1110a835e29e6e360b4127ed84fca98c6276b0b171ccd6cb223_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:1168d897f16b276ba5a6e6170e31fbe1499a980666aed493b2fe27036471ba55_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:15300e7d45a8e2093ef6f33303174f7361de7d9b648f8c9f2cf06f8ba3c56c76_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:6ccd50b0049e4ba0f9d4ea8779b17c6acc95395490579fbaa3b9e9084ac7d314_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/openvsx-rhel9@sha256:e762a9019e4b5afd27331ad519a5b63a2bba3c7eb522533e0932e97c2879a36e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:5f4c5323da09593280fc61c2df7fced0f6dc9d3ca322d27069f51334c3d18dae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:918c66e3ea09e481c38673314021ef1aa6b46afc9dcb115b9d19b6819c5db4a7_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:cc4f2ce5926da93eaf81b0935d3171d81a310ec97e3c08bbbf6599752446810d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:f2bcd5123e4fad7aa4ad54f2819a1beb75d844302aa162e0335c1a0191fe5346_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:27b7eef1c64e432dbe15e92cf745a951aebdc9b379d9c02dbfef6df296c39cd1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:3cfcd5f9ab8ec42cefd8fab992ecb493a9d14126bdf53ba542ffa4b51fd1684c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:641354f1d56627f49af3e32ad963616b69aac644ac33d664e7fe29de32fe43b3_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/server-rhel9@sha256:fa5400aecca1a46c4b98d00c749ea56d6187ced20952f02e4dd1c12e2467117e_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:15a4a74016cdb94aece0bc651edd221b72a9202e5fd414d30ae969707cb5b4c9_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:5361443dee5415dc554d79e2fa23a6b336f1d8ea89fb20a4caa72f70574b939b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:a152f1e75dd10ba692587a4e702d59cd1c5adcde8b97390f58742270edf85d33_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/traefik-rhel9@sha256:f17428eced9d6bec1eaaa1510b68250824d3ace2f66af7f31fbf7327ca11540c_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:42d8388fafeb7c188b03389c92561da4068f91a8cc2343f33d967939342e4f64_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:a86e59cedc67e9fcee3412afa157572a2ab815a3d9e18da03ada502f7313cc80_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:b60b4b992b89b82620e5ea618350a97434b272d1f023200dcbeae642612e3569_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-base-rhel9@sha256:ee9d72769b916b350307df495022e04add1fbcd67c1e62757fd316e7f1dd60ae_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:53618eb41967e64660e87e5ad6ce8f5d9803aed9bb48da8898aaefb4d0a4632d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:65176a94e684c200beef8f25016982ab212bdcd10d31b54a831310e20c026f77_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:a4ca99dc99b864ef805f3e8d997f0567168c809433f16ec23540c0b8ead96216_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.23:registry.redhat.io/devspaces/udi-rhel9@sha256:cc31b6212f77e03383e615ee30fd97419806c3841f18d2f6c950d82cdd21e872_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:12280
Vulnerability from csaf_redhat - Published: 2025-07-30 09:55 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Core part of Jackson that defines Streaming API as well as basic shared abstractions.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12280",
"url": "https://access.redhat.com/errata/RHSA-2025:12280"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12280.json"
}
],
"title": "Red Hat Security Advisory: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:24+00:00",
"generator": {
"date": "2026-03-18T20:51:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:12280",
"initial_release_date": "2025-07-30T09:55:57+00:00",
"revision_history": [
{
"date": "2025-07-30T09:55:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T09:55:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-core-0:2.19.1-1.el9_6.src",
"product_id": "jackson-core-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.el9_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-annotations-0:2.19.1-1.el9_6.src",
"product_id": "jackson-annotations-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.el9_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-databind-0:2.19.1-1.el9_6.src",
"product_id": "jackson-databind-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.el9_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.el9_6.src",
"product_id": "jackson-modules-base-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.el9_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-core@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-annotations@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-databind@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-module-jaxb-annotations@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-json-provider@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-providers@2.19.1-1.el9_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-annotations-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-core-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-databind-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-core-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T09:55:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12280"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:10119
Vulnerability from csaf_redhat - Published: 2025-07-01 16:31 - Updated: 2026-03-18 20:51A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.
A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.
A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat Product OCP \nTools 4.13. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10119",
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10119.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:22+00:00",
"generator": {
"date": "2026-03-18T20:51:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:10119",
"initial_release_date": "2025-07-01T16:31:24+00:00",
"revision_history": [
{
"date": "2025-07-01T16:31:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T16:31:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.13",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.13::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750916374-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750916374-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750916374-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.13.1750916671-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750916374-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.13.1750916671-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750916374-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:10120
Vulnerability from csaf_redhat - Published: 2025-07-01 16:53 - Updated: 2026-03-18 20:51A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.
A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.
A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.14. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10120",
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10120.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:21+00:00",
"generator": {
"date": "2026-03-18T20:51:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:10120",
"initial_release_date": "2025-07-01T16:53:09+00:00",
"revision_history": [
{
"date": "2025-07-01T16:53:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T16:53:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.14",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.14::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750903189-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750903189-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750903189-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.14.1750903529-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750903189-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.14.1750903529-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750903189-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:10098
Vulnerability from csaf_redhat - Published: 2025-07-01 14:34 - Updated: 2026-03-18 20:51A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.
A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.
A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.16. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not enforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10098",
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10098.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.16 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:21+00:00",
"generator": {
"date": "2026-03-18T20:51:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:10098",
"initial_release_date": "2025-07-01T14:34:48+00:00",
"revision_history": [
{
"date": "2025-07-01T14:34:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T14:34:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.16",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.16::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750857144-3.el9.src",
"product": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.src",
"product_id": "jenkins-0:2.504.2.1750857144-3.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750857144-3.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"product": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"product_id": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.16.1750857315-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"product_id": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750857144-3.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"product_id": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.16.1750857315-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src"
},
"product_reference": "jenkins-0:2.504.2.1750857144-3.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
},
"product_reference": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:11474
Vulnerability from csaf_redhat - Published: 2025-07-21 16:58 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4.\n\nSecurity Fix(es):\n\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:11474",
"url": "https://access.redhat.com/errata/RHSA-2025:11474"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11474.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.23 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:23+00:00",
"generator": {
"date": "2026-03-18T20:51:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:11474",
"initial_release_date": "2025-07-21T16:58:36+00:00",
"revision_history": [
{
"date": "2025-07-21T16:58:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-23T22:30:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product_id": "Red Hat JBoss Enterprise Application Platform 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-21T16:58:36+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:11474"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:3465
Vulnerability from csaf_redhat - Published: 2025-04-01 13:12 - Updated: 2026-03-20 01:39A flaw was found in Netty. An unsafe reading of the environment file could potentially cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crashes.
A flaw was found in the createTempFile method of hornetq. Affected version of hornetq allows attackers to arbitrarily overwrite files or access sensitive information.
A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.
A flaw was found in Netty's SslHandler. This vulnerability allows a native crash via a specially crafted packet that bypasses proper validation.
A flaw was found in Netty. An unsafe reading of the environment file could cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crash.
A flaw was found in Apache Commons BeanUtils. This vulnerability allows remote attackers to execute arbitrary code via uncontrolled access to the declaredClass property on Java enum objects, which can expose the class loader when property paths are passed from external sources to methods like getProperty() or getNestedProperty().
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4.\n\nSecurity Fix(es):\n\n* io.netty/netty: Denial of Service attack on windows app using Netty (CVE-2024-47535)\n\n* netty-common: Denial of Service attack on windows app using Netty (CVE-2025-25193)\n\n* io.netty/netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine (CVE-2025-24970)\n\n* org.wildfly.core/wildfly-server: Wildfly improper RBAC permission (CVE-2025-23367)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:3465",
"url": "https://access.redhat.com/errata/RHSA-2025:3465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3465.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.21 security update",
"tracking": {
"current_release_date": "2026-03-20T01:39:41+00:00",
"generator": {
"date": "2026-03-20T01:39:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:3465",
"initial_release_date": "2025-04-01T13:12:18+00:00",
"revision_history": [
{
"date": "2025-04-01T13:12:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-04-01T13:12:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-20T01:39:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.119-1.Final_redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"product_id": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.119-1.Final_redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"product_id": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.21-3.GA_29548_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.119-1.Final_redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"product_id": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.119-1.Final_redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"product_id": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.21-3.GA_29548_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.119-1.Final_redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"product_id": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.119-1.Final_redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"product_id": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.21-3.GA_29548_redhat_00001.1.el9eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.119-1.Final_redhat_00004.1.el7eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.119-1.Final_redhat_00004.1.el7eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.119-1.Final_redhat_00004.1.el8eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.119-1.Final_redhat_00004.1.el8eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.119-1.Final_redhat_00004.1.el9eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.119-1.Final_redhat_00004.1.el9eap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-all@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.119-1.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.21-3.GA_29548_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.21-3.GA_29548_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.21-3.GA_29548_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.21-3.GA_29548_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.21-3.GA_29548_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-all@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.119-1.Final_redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.21-3.GA_29548_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.21-3.GA_29548_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.21-3.GA_29548_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.21-3.GA_29548_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.21-3.GA_29548_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.21-3.GA_29548_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.119-1.Final_redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.21-3.GA_29548_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.21-3.GA_29548_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.21-3.GA_29548_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.21-3.GA_29548_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.21-3.GA_29548_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.21-3.GA_29548_redhat_00001.1.el9eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47535",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-11-12T16:01:18.772613+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2325538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty. An unsafe reading of the environment file could potentially cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: Denial of Service attack on windows app using Netty",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47535"
},
{
"category": "external",
"summary": "RHBZ#2325538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47535"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/fbf7a704a82e7449b48bd0bbb679f5661c6d61a3",
"url": "https://github.com/netty/netty/commit/fbf7a704a82e7449b48bd0bbb679f5661c6d61a3"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv",
"url": "https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv"
}
],
"release_date": "2024-11-12T15:50:08.334000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:12:18+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3465"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: Denial of Service attack on windows app using Netty"
},
{
"cve": "CVE-2024-51127",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2024-11-04T18:00:59.553511+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323697"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the createTempFile method of hornetq. Affected version of hornetq allows attackers to arbitrarily overwrite files or access sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hornetq-core-client: Arbitrarily overwrite files or access sensitive information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-51127"
},
{
"category": "external",
"summary": "RHBZ#2323697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-51127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51127"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-51127",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-51127"
},
{
"category": "external",
"summary": "http://hornetq.com",
"url": "http://hornetq.com"
},
{
"category": "external",
"summary": "https://github.com/JAckLosingHeart/CWE-378/blob/main/CVE-2024-51127.md",
"url": "https://github.com/JAckLosingHeart/CWE-378/blob/main/CVE-2024-51127.md"
}
],
"release_date": "2024-11-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:12:18+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3465"
},
{
"category": "workaround",
"details": "There is currently no known mitigation for this vulnerability.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hornetq-core-client: Arbitrarily overwrite files or access sensitive information"
},
{
"acknowledgments": [
{
"names": [
"Claudia Bartolini",
"Marco Ventura",
"Massimiliano Brolli"
],
"organization": "TIM S.p.A"
}
],
"cve": "CVE-2025-23367",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2025-01-14T14:56:46.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2337620"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. \nThe vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.wildfly.core:wildfly-server: Wildfly improper RBAC permission",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has evaluated this issue and the attacker must be authenticated as a user that belongs to the \"Monitor\" or \"Auditor\" management groups. It requires previous privileges to jeopardize an environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-23367"
},
{
"category": "external",
"summary": "RHBZ#2337620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-23367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-23367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23367"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-qr6x-62gq-4ccp",
"url": "https://github.com/advisories/GHSA-qr6x-62gq-4ccp"
}
],
"release_date": "2025-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:12:18+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3465"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.wildfly.core:wildfly-server: Wildfly improper RBAC permission"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-02-10T23:00:52.785132+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344787"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s SslHandler. This vulnerability allows a native crash via a specially crafted packet that bypasses proper validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "io.netty:netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Netty\u0027s SslHandler is of important severity rather than moderate because it directly impacts the stability and reliability of applications using native SSLEngine. By sending a specially crafted packet, an attacker can trigger a native crash, leading to a complete process termination. Unlike typical moderate vulnerabilities that might cause limited disruptions or require specific conditions, this flaw can be exploited remotely to induce a Denial of Service (DoS), affecting high-availability systems and mission-critical services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24970"
},
{
"category": "external",
"summary": "RHBZ#2344787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24970"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4",
"url": "https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw",
"url": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw"
}
],
"release_date": "2025-02-10T21:57:28.730000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:12:18+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3465"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "io.netty:netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine"
},
{
"cve": "CVE-2025-25193",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-02-10T23:00:54.794769+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty. An unsafe reading of the environment file could cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: Denial of Service attack on windows app using Netty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects Windows environments, therefore, this would affect an environment when running a supported Red Hat JBoss EAP 7 or 8, for example, if running on Windows.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-25193"
},
{
"category": "external",
"summary": "RHBZ#2344788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-25193",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25193"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386",
"url": "https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx",
"url": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx"
}
],
"release_date": "2025-02-10T22:02:17.197000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:12:18+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3465"
},
{
"category": "workaround",
"details": "Currently, no mitigation is available for this vulnerability.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: Denial of Service attack on windows app using Netty"
},
{
"cve": "CVE-2025-48734",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2025-05-28T14:00:56.619771+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2368956"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Commons BeanUtils. This vulnerability allows remote attackers to execute arbitrary code via uncontrolled access to the declaredClass property on Java enum objects, which can expose the class loader when property paths are passed from external sources to methods like getProperty() or getNestedProperty().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum\u0027s declaredClass property by default",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because a flaw exists in Apache Commons BeanUtils, where PropertyUtilsBean and BeanUtilsBean allow uncontrolled access to the declaredClass property of Java enum objects. Applications that pass untrusted property paths directly to getProperty() or getNestedProperty() methods are at risk, as attackers can exploit this behavior to retrieve the ClassLoader instance and execute arbitrary code in the context of the affected application. This issue leads to compromise of confidentiality, integrity, and availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48734"
},
{
"category": "external",
"summary": "RHBZ#2368956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368956"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48734"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-wxr5-93ph-8wr9",
"url": "https://github.com/advisories/GHSA-wxr5-93ph-8wr9"
},
{
"category": "external",
"summary": "https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc",
"url": "https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9",
"url": "https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/28/6",
"url": "https://www.openwall.com/lists/oss-security/2025/05/28/6"
}
],
"release_date": "2025-05-28T13:32:08.300000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:12:18+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3465"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum\u0027s declaredClass property by default"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:12:18+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3465"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.119-1.Final_redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.119-1.Final_redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.21-3.GA_29548_redhat_00001.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:14118
Vulnerability from csaf_redhat - Published: 2025-08-20 00:25 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14118",
"url": "https://access.redhat.com/errata/RHSA-2025:14118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14118.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:26+00:00",
"generator": {
"date": "2026-03-18T20:51:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:14118",
"initial_release_date": "2025-08-20T00:25:33+00:00",
"revision_history": [
{
"date": "2025-08-20T00:25:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T00:25:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-4.0-api@9.0.30-3.module%2Bel8.6.0%2B23397%2B419fb810.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.30-3.module%2Bel8.6.0%2B23397%2B419fb810.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-6.module%2Bel8.6.0%2B23400%2Baafc0b27?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.30-3.module%2Bel8.6.0%2B23397%2B419fb810.2?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-6.module%2Bel8.6.0%2B23400%2Baafc0b27?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=aarch64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=aarch64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=aarch64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=aarch64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=s390x\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=s390x\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=s390x\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=s390x\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T00:25:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14118"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-0:69-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-0:2.19.1-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-0:2.19.2-2.module+el8.6.0+23397+419fb810.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-1:9.0.30-3.module+el8.6.0+23397+419fb810.2.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-0:3.0.26-6.module+el8.6.0+23400+aafc0b27.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2026:0742
Vulnerability from csaf_redhat - Published: 2026-01-19 00:15 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.1.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.12, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.1.13 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jackson-core: jackson-core Potential StackoverflowError [eap-7.1.z] (CVE-2025-52999)\n\n* netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability [eap-7.1.z] (CVE-2025-55163)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0742",
"url": "https://access.redhat.com/errata/RHSA-2026:0742"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=7.1",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=7.1"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "JBEAP-30775",
"url": "https://issues.redhat.com/browse/JBEAP-30775"
},
{
"category": "external",
"summary": "JBEAP-31347",
"url": "https://issues.redhat.com/browse/JBEAP-31347"
},
{
"category": "external",
"summary": "JBEAP-31349",
"url": "https://issues.redhat.com/browse/JBEAP-31349"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0742.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.13 on RHEL 7 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:29+00:00",
"generator": {
"date": "2026-03-18T20:51:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:0742",
"initial_release_date": "2026-01-19T00:15:08+00:00",
"revision_history": [
{
"date": "2026-01-19T00:15:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-19T00:15:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src",
"product": {
"name": "eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src",
"product_id": "eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@1.4.18-18.SP16_redhat_00001.1.ep7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src",
"product": {
"name": "eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src",
"product_id": "eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.63-3.Final_redhat_00004.1.ep7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"product": {
"name": "eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"product_id": "eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.8.11-3.redhat_00004.1.ep7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"product": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"product_id": "eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations@2.8.11-3.redhat_00004.1.ep7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"product": {
"name": "eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"product_id": "eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.8.11-2.redhat_00004.1.ep7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"product": {
"name": "eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"product_id": "eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-providers@2.8.11-3.redhat_00004.1.ep7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"product": {
"name": "eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"product_id": "eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.8.11-2.redhat_00004.1.ep7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src",
"product": {
"name": "eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src",
"product_id": "eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.1.13-6.GA_redhat_00002.1.ep7.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch",
"product": {
"name": "eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch",
"product_id": "eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@1.4.18-18.SP16_redhat_00001.1.ep7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"product": {
"name": "eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"product_id": "eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.63-3.Final_redhat_00004.1.ep7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"product": {
"name": "eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"product_id": "eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-all@4.1.63-3.Final_redhat_00004.1.ep7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"product": {
"name": "eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"product_id": "eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.8.11-3.redhat_00004.1.ep7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"product": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"product_id": "eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations@2.8.11-3.redhat_00004.1.ep7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"product": {
"name": "eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"product_id": "eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jdk8@2.8.11-2.redhat_00004.1.ep7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"product": {
"name": "eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"product_id": "eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jsr310@2.8.11-2.redhat_00004.1.ep7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"product": {
"name": "eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"product_id": "eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.8.11-2.redhat_00004.1.ep7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"product": {
"name": "eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"product_id": "eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-base@2.8.11-3.redhat_00004.1.ep7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"product": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"product_id": "eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-json-provider@2.8.11-3.redhat_00004.1.ep7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"product": {
"name": "eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"product_id": "eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.8.11-2.redhat_00004.1.ep7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"product": {
"name": "eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"product_id": "eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.1.13-6.GA_redhat_00002.1.ep7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"product_id": "eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.1.13-6.GA_redhat_00002.1.ep7.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch"
},
"product_reference": "eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src"
},
"product_reference": "eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch"
},
"product_reference": "eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src"
},
"product_reference": "eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch"
},
"product_reference": "eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch"
},
"product_reference": "eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch"
},
"product_reference": "eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch"
},
"product_reference": "eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src"
},
"product_reference": "eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch"
},
"product_reference": "eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src"
},
"product_reference": "eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch"
},
"product_reference": "eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src"
},
"product_reference": "eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch"
},
"product_reference": "eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src"
},
"product_reference": "eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch"
},
"product_reference": "eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch"
},
"product_reference": "eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src"
},
"product_reference": "eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch"
},
"product_reference": "eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src"
},
"product_reference": "eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-19T00:15:08+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0742"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-08-13T15:01:55.372237+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2388252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the \"MadeYouReset\" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a denial of service (DoS). While some DoS flaws are classified as Moderate, \u201cMadeYouReset\u201d is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling \u2014 malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55163"
},
{
"category": "external",
"summary": "RHBZ#2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4",
"url": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/767506",
"url": "https://kb.cert.org/vuls/id/767506"
}
],
"release_date": "2025-08-13T14:17:36.111000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-19T00:15:08+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0742"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-annotations-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-core-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jdk8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-datatype-jsr310-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-base-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-json-provider-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-jaxrs-providers-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-module-jaxb-annotations-0:2.8.11-3.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-jackson-modules-java8-0:2.8.11-2.redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.63-3.Final_redhat_00004.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-18.SP16_redhat_00001.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.src",
"7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.13-6.GA_redhat_00002.1.ep7.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability"
}
]
}
RHSA-2025:17189
Vulnerability from csaf_redhat - Published: 2025-10-01 18:01 - Updated: 2026-03-18 16:08A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Logging for Red Hat OpenShift - 5.8.22",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Logging 5.8.22 is a cluster-wide logging solution for OpenShift that collects and manages applications, infrastructure, and audit logs.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:17189",
"url": "https://access.redhat.com/errata/RHSA-2025:17189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52999",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_17189.json"
}
],
"title": "Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.8.22",
"tracking": {
"current_release_date": "2026-03-18T16:08:26+00:00",
"generator": {
"date": "2026-03-18T16:08:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:17189",
"initial_release_date": "2025-10-01T18:01:13+00:00",
"revision_history": [
{
"date": "2025-10-01T18:01:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-01T18:01:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T16:08:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Logging for Red Hat OpenShift 5.8",
"product": {
"name": "Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.8::el9"
}
}
}
],
"category": "product_family",
"name": "Logging for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256%3A10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3A5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256%3A5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel9-operator@sha256%3A22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel9@sha256%3Abf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3A6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"product_id": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel9@sha256%3A13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel9@sha256%3A686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3A21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"product_id": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel9@sha256%3A7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3Af5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"product_id": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel9@sha256%3A9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"product_id": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256%3Adf31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3A2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3Acec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3A451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel9-operator@sha256%3A8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel9@sha256%3A7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3Ada617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"product_id": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel9@sha256%3Ab4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel9@sha256%3A3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3A2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"product_id": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel9@sha256%3A08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3A3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"product_id": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel9@sha256%3Aba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3Aa856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3A719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3Ae497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel9-operator@sha256%3Ab8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel9@sha256%3Af76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3Aa474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel9@sha256%3A8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel9@sha256%3A9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3A6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel9@sha256%3A3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3Ace751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel9@sha256%3Ab169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3Ac3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3A5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3A90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3A3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel9-operator@sha256%3A7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel9@sha256%3A5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3Ab5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"product_id": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel9@sha256%3A7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel9@sha256%3A128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3Abba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"product_id": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel9@sha256%3Ae3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3A38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"product_id": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel9@sha256%3Aa49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3Ab7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3Aeed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le"
],
"known_not_affected": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-01T18:01:13+00:00",
"details": "For OpenShift Container Platform 4.14 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/release_notes/ocp-4-14-release-notes\n\nFor Red Hat OpenShift Logging 5.8, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.14/logging/cluster-logging-upgrading.html",
"product_ids": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17189"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2026:0743
Vulnerability from csaf_redhat - Published: 2026-01-19 00:18 - Updated: 2026-03-18 20:51A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.16 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.15, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.16 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* UNDERTOW-2429 undertow: Improper State Management in Proxy Protocol parsing causes information leakage [eap-7.3.z] (CVE-2024-7885)\n\n* jackson-core: jackson-core Potential StackoverflowError [eap-7.3.z] (CVE-2025-52999)\n\n* netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability [eap-7.3.z] (CVE-2025-55163)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0743",
"url": "https://access.redhat.com/errata/RHSA-2026:0743"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.3",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.3"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2305290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2305290"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "JBEAP-30792",
"url": "https://issues.redhat.com/browse/JBEAP-30792"
},
{
"category": "external",
"summary": "JBEAP-31038",
"url": "https://issues.redhat.com/browse/JBEAP-31038"
},
{
"category": "external",
"summary": "JBEAP-31348",
"url": "https://issues.redhat.com/browse/JBEAP-31348"
},
{
"category": "external",
"summary": "JBEAP-31350",
"url": "https://issues.redhat.com/browse/JBEAP-31350"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0743.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.16 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:29+00:00",
"generator": {
"date": "2026-03-18T20:51:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:0743",
"initial_release_date": "2026-01-19T00:18:54+00:00",
"revision_history": [
{
"date": "2026-01-19T00:18:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-19T00:18:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"product": {
"name": "eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"product_id": "eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.10.4-4.redhat_00008.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"product": {
"name": "eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"product_id": "eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.10.4-6.redhat_00008.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"product_id": "eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.63-6.Final_redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"product": {
"name": "eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"product_id": "eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-providers@2.10.4-4.redhat_00008.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"product_id": "eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-20.Final_redhat_00021.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"product": {
"name": "eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"product_id": "eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.10.4-6.redhat_00008.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"product": {
"name": "eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"product_id": "eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.10.4-3.redhat_00008.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"product": {
"name": "eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"product_id": "eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.10.4-4.redhat_00008.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"product_id": "eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.0.41-6.SP7_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"product": {
"name": "eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"product_id": "eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.3.16-3.GA_redhat_00003.1.el7eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"product_id": "eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.10.4-4.redhat_00008.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"product_id": "eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations@2.10.4-6.redhat_00008.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"product_id": "eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.10.4-6.redhat_00008.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.63-6.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"product_id": "eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-all@4.1.63-6.Final_redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"product_id": "eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-base@2.10.4-4.redhat_00008.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"product_id": "eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-json-provider@2.10.4-4.redhat_00008.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4-to-eap7.3@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.0@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.1@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2-to-eap7.3@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.3-server@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.0@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.1@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly11.0@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly12.0@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly13.0-server@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly14.0-server@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly15.0-server@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly16.0-server@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly17.0-server@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly18.0-server@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly8.2@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly9.0@1.7.2-20.Final_redhat_00021.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"product_id": "eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.10.4-6.redhat_00008.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"product_id": "eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jdk8@2.10.4-3.redhat_00008.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"product_id": "eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jsr310@2.10.4-3.redhat_00008.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"product_id": "eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.10.4-3.redhat_00008.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"product_id": "eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.10.4-4.redhat_00008.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.0.41-6.SP7_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.3.16-3.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.3.16-3.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.3.16-3.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.3.16-3.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.3.16-3.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src"
},
"product_reference": "eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src"
},
"product_reference": "eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src"
},
"product_reference": "eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src"
},
"product_reference": "eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src"
},
"product_reference": "eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src"
},
"product_reference": "eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src"
},
"product_reference": "eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.3-EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"BfC"
]
}
],
"cve": "CVE-2024-7885",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-08-16T09:00:41.686000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2305290"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Improper State Management in Proxy Protocol parsing causes information leakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat decided to rate this vulnerability as Important because of the potential loss of Availability and no additional privileges being required.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7885"
},
{
"category": "external",
"summary": "RHBZ#2305290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2305290"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7885"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-19T00:18:54+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0743"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undertow: Improper State Management in Proxy Protocol parsing causes information leakage"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-19T00:18:54+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0743"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-08-13T15:01:55.372237+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2388252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the \"MadeYouReset\" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a denial of service (DoS). While some DoS flaws are classified as Moderate, \u201cMadeYouReset\u201d is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling \u2014 malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55163"
},
{
"category": "external",
"summary": "RHBZ#2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4",
"url": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/767506",
"url": "https://kb.cert.org/vuls/id/767506"
}
],
"release_date": "2025-08-13T14:17:36.111000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-19T00:18:54+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0743"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-annotations-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-core-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-databind-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jdk8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-datatype-jsr310-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-base-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-json-provider-0:2.10.4-4.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-jaxrs-providers-0:2.10.4-4.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-module-jaxb-annotations-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-base-0:2.10.4-6.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jackson-modules-java8-0:2.10.4-3.redhat_00008.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-20.Final_redhat_00021.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-20.Final_redhat_00021.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-netty-0:4.1.63-6.Final_redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-netty-all-0:4.1.63-6.Final_redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-undertow-0:2.0.41-6.SP7_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.16-3.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.16-3.GA_redhat_00003.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability"
}
]
}
RHSA-2025:12283
Vulnerability from csaf_redhat - Published: 2025-07-30 09:49 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Core part of Jackson that defines Streaming API as well as basic shared abstractions.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12283",
"url": "https://access.redhat.com/errata/RHSA-2025:12283"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12283.json"
}
],
"title": "Red Hat Security Advisory: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:24+00:00",
"generator": {
"date": "2026-03-18T20:51:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:12283",
"initial_release_date": "2025-07-30T09:49:42+00:00",
"revision_history": [
{
"date": "2025-07-30T09:49:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T09:49:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-core-0:2.19.1-1.el9_0.src",
"product_id": "jackson-core-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.el9_0.src",
"product_id": "jackson-modules-base-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-databind-0:2.19.1-1.el9_0.src",
"product_id": "jackson-databind-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-annotations-0:2.19.1-1.el9_0.src",
"product_id": "jackson-annotations-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-core@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-json-provider@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-providers@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-module-jaxb-annotations@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-databind@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-annotations@2.19.1-1.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-annotations-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-core-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-databind-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-core-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T09:49:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12283"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:14117
Vulnerability from csaf_redhat - Published: 2025-08-20 00:22 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14117",
"url": "https://access.redhat.com/errata/RHSA-2025:14117"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14117.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:26+00:00",
"generator": {
"date": "2026-03-18T20:51:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:14117",
"initial_release_date": "2025-08-20T00:22:33+00:00",
"revision_history": [
{
"date": "2025-08-20T00:22:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T00:22:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-3.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-3.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-4.module%2Bel8.8.0%2B23413%2B86800787?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-4.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-2.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-2.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.8.0%2B23405%2B763e93bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.8.0%2B23405%2B763e93bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-3.module%2Bel8.8.0%2B23413%2B86800787?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.62-1.module%2Bel8.8.0%2B22367%2B4894538d?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-7.module%2Bel8.8.0%2B22365%2Bb433a336?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-3.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-3.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-4.module%2Bel8.8.0%2B23413%2B86800787?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-4.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-2.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.8.0%2B23405%2B763e93bf?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-3.module%2Bel8.8.0%2B23413%2B86800787?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.62-1.module%2Bel8.8.0%2B22367%2B4894538d?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-7.module%2Bel8.8.0%2B22365%2Bb433a336?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T00:22:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14117"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-0:69-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-0:2.19.1-3.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-0:2.19.1-4.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-0:2.19.1-4.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-0:2.19.1-1.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-0:2.19.1-2.module+el8.8.0+23396+b3893f62.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-0:2.19.1-1.module+el8.8.0+23405+763e93bf.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-0:2.19.2-3.module+el8.8.0+23413+86800787.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-1:9.0.62-1.module+el8.8.0+22367+4894538d.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-0:3.0.26-7.module+el8.8.0+22365+b433a336.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:15717
Vulnerability from csaf_redhat - Published: 2025-09-11 19:39 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new security update is now available for Red Hat Single Sign-On 7.6 from the Customer Portal.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis update to Red Hat Single Sign-On 7.6.12 includes a security update with important impact.\n\nSecurity fixes:\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15717",
"url": "https://access.redhat.com/errata/RHSA-2025:15717"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15717.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.12 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:36+00:00",
"generator": {
"date": "2026-03-18T20:51:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:15717",
"initial_release_date": "2025-09-11T19:39:47+00:00",
"revision_history": [
{
"date": "2025-09-11T19:39:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-11T19:39:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Single Sign-On 7.6.12",
"product": {
"name": "Red Hat Single Sign-On 7.6.12",
"product_id": "Red Hat Single Sign-On 7.6.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Single Sign-On"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7.6.12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-11T19:39:47+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7.6.12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15717"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Red Hat Single Sign-On 7.6.12"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7.6.12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2026:4916
Vulnerability from csaf_redhat - Published: 2026-03-18 13:17 - Updated: 2026-03-18 20:51A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.
A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.
A flaw was found in Eclipse JGit. This vulnerability can allow information disclosure, denial of service, and other security issues when parsing XML files.
A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application's database, resulting in an application level denial of service.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.24 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.23, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.24 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\n* undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF [eap-7.4.z] (CVE-2025-12543)\n\n* cxf: CXF JMS Code Execution Vulnerability [eap-7.4.z] (CVE-2025-48913)\n\n* netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-55163)\n\n* org.eclipse.jgit: XXE vulnerability in Eclipse JGit [eap-7.4.z] (CVE-2025-4949)\n\n* hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection [eap-7.4.z] (CVE-2026-0603)\n\n* com.google.protobuf/protobuf-java: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)\n\n* undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded [eap-7.4.z] (CVE-2024-3884)\n\n* undertow-core: Undertow MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-9784)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:4916",
"url": "https://access.redhat.com/errata/RHSA-2026:4916"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2275287",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275287"
},
{
"category": "external",
"summary": "2313454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454"
},
{
"category": "external",
"summary": "2367730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367730"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "2387221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387221"
},
{
"category": "external",
"summary": "2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "2392306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392306"
},
{
"category": "external",
"summary": "2408784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408784"
},
{
"category": "external",
"summary": "2427147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427147"
},
{
"category": "external",
"summary": "JBEAP-30075",
"url": "https://issues.redhat.com/browse/JBEAP-30075"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_4916.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.24 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:14+00:00",
"generator": {
"date": "2026-03-18T20:51:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:4916",
"initial_release_date": "2026-03-18T13:17:47+00:00",
"revision_history": [
{
"date": "2026-03-18T13:17:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-18T13:17:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product": {
"name": "Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_els:7.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"product": {
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"product_id": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.15.27-1.Final_redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.17-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"product_id": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-4.SP2_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"product_id": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-glassfish-jsf@2.3.14-10.SP10_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.27-2.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"product_id": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf@3.5.11-1.SP1_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.24-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-elytron-web@1.9.6-2.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"product_id": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-commons-beanutils@1.11.0-2.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.38-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.124-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.39-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.16-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-43.Final_redhat_00043.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.11-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"product_id": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-eclipse-jgit@5.13.5.202508271544-2.r_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"product_id": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.24-4.GA_redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.124-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.15.27-1.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.15.27-1.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-4.SP2_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-validator-cdi@6.0.23-4.SP2_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-glassfish-jsf@2.3.14-10.SP10_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.27-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf@3.5.11-1.SP1_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.5.11-1.SP1_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.5.11-1.SP1_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.5.11-1.SP1_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.24-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.24-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.24-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.24-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.24-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.24-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.24-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.24-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.24-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-server@1.9.6-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"product_id": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-commons-beanutils@1.11.0-2.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.38-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-core@5.3.38-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-entitymanager@5.3.38-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-envers@5.3.38-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-java8@5.3.38-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-all@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.124-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.39-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.16-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling-river@2.0.16-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-43.Final_redhat_00043.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-43.Final_redhat_00043.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-43.Final_redhat_00043.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-client@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.15.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-eclipse-jgit@5.13.5.202508271544-2.r_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.24-4.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.24-4.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.24-4.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.24-4.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.24-4.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.24-4.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.124-1.Final_redhat_00001.1.el8eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.124-1.Final_redhat_00001.1.el8eap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src"
},
"product_reference": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 8",
"product_id": "8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3884",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-04-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275287"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates this as a Moderate impact since this requires the use of a specific form method by the server that must be externally available and the input is not sanitized by the given servlet or class implementing its use.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3884"
},
{
"category": "external",
"summary": "RHBZ#2275287",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275287"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3884"
}
],
"release_date": "2025-12-03T16:50:50+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4916"
},
{
"category": "workaround",
"details": "It is possible to mitigate the vulnerability by performing an upper-level verification to ensure the content size sent server side is within the allowed parameters.",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-09-19T01:20:29.981665+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2313454"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "protobuf: StackOverflow vulnerability in Protocol Buffers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.\n\nThe protobuf package as shipped in RHEL does not include the affected java or kotlin bindings, therefore RHEL is Not Affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7254"
},
{
"category": "external",
"summary": "RHBZ#2313454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254"
},
{
"category": "external",
"summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa",
"url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa"
}
],
"release_date": "2024-09-19T01:15:10.963000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4916"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "protobuf: StackOverflow vulnerability in Protocol Buffers"
},
{
"cve": "CVE-2025-4949",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2025-05-21T07:00:48.762597+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2367730"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse JGit. This vulnerability can allow information disclosure, denial of service, and other security issues when parsing XML files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.eclipse.jgit: XXE vulnerability in Eclipse JGit",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. A flaw in Eclipse JGit allows for XML External Entity (XXE) attacks when parsing specially crafted XML files. This can lead to local denial of service in affected Red Hat products that utilize JGit\u0027s ManifestParser or AmazonS3 class for git transport. The current 9.8 rating by NVD assumes a default, server-side exploitation path. However, the vulnerability resides in the experimental AmazonS3 transport class within Eclipse JGit, which is not enabled by default and requires non-standard configuration (Attack Complexity: High). Furthermore, exploitation typically occurs via client-side tools (e.g., repo) requiring active user participation (User Interaction: Required), limiting the primary risk to local Denial of Service rather than remote, unauthenticated compromise (Availability: High).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4949"
},
{
"category": "external",
"summary": "RHBZ#2367730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367730"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4949",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4949"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/64",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/64"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281",
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281"
},
{
"category": "external",
"summary": "https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1",
"url": "https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1"
}
],
"release_date": "2025-05-21T06:47:19.777000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4916"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.eclipse.jgit: XXE vulnerability in Eclipse JGit"
},
{
"cve": "CVE-2025-9784",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-01T06:19:20.938000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2392306"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the \"MadeYouReset\" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Undertow MadeYouReset HTTP/2 DDoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a Denial of Service (DoS). While some DoS flaws are classified as Moderate, \u201cMadeYouReset\u201d is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling \u2014 malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9784"
},
{
"category": "external",
"summary": "RHBZ#2392306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9784"
},
{
"category": "external",
"summary": "https://github.com/undertow-io/undertow/pull/1778",
"url": "https://github.com/undertow-io/undertow/pull/1778"
},
{
"category": "external",
"summary": "https://github.com/undertow-io/undertow/releases/tag/2.2.38.Final",
"url": "https://github.com/undertow-io/undertow/releases/tag/2.2.38.Final"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/UNDERTOW-2598",
"url": "https://issues.redhat.com/browse/UNDERTOW-2598"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/767506",
"url": "https://kb.cert.org/vuls/id/767506"
}
],
"release_date": "2025-09-01T06:21:54.614000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4916"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undertow: Undertow MadeYouReset HTTP/2 DDoS Vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Ahmet Artu\u00e7"
]
}
],
"cve": "CVE-2025-12543",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-10-31T06:15:35.424000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an Important severity because it can be remotely exploited without authentication. However, limited user interaction is required for full impact. It could allow attackers to hijack additional accounts, steal credentials, or gain access to internal systems. The issue stems from improper input validation of HTTP Host headers, leading to serious breaches in confidentiality and integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12543"
},
{
"category": "external",
"summary": "RHBZ#2408784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12543"
}
],
"release_date": "2026-01-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4916"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use, applicability, or stability.",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF"
},
{
"cve": "CVE-2025-48913",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-08-08T10:00:54.007824+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2387221"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw should be considered Important because the impact goes beyond a simple denial of service or configuration misuse. By allowing untrusted users to configure JMS with RMI or LDAP URLs, attackers could achieve remote code execution by loading attacker-controlled classes or objects. Although this requires the precondition that the attacker has access to JMS configuration, in many enterprise deployments this may be exposed through integration layers or misconfigured permissions, making the attack surface broader than a purely local or limited-scope scenario.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48913"
},
{
"category": "external",
"summary": "RHBZ#2387221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48913"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83",
"url": "https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83"
}
],
"release_date": "2025-08-08T09:21:22.208000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4916"
},
{
"category": "workaround",
"details": "To reduce risk, deployments should restrict the allowed protocols in JMS configuration to trusted and expected values only. In particular, disallow the use of rmi:// and ldap:// URLs, which could be abused for remote class loading and code execution.",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4916"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-08-13T15:01:55.372237+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2388252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the \"MadeYouReset\" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a denial of service (DoS). While some DoS flaws are classified as Moderate, \u201cMadeYouReset\u201d is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling \u2014 malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55163"
},
{
"category": "external",
"summary": "RHBZ#2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4",
"url": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/767506",
"url": "https://kb.cert.org/vuls/id/767506"
}
],
"release_date": "2025-08-13T14:17:36.111000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4916"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Christiaan Swiers"
],
"organization": "YouGina"
},
{
"names": [
"Tommy Williams"
],
"organization": "HeroDevs"
}
],
"cve": "CVE-2026-0603",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2026-01-05T13:12:29.816000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427147"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application\u0027s database, resulting in an application level denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.hibernate/hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows a remote attacker with low privileges to perform second-order SQL injection in applications using Hibernate\u0027s InlineIdsOrClauseBuilder with unsanitized non-alphanumeric characters in the ID column. This could lead to sensitive information disclosure and data manipulation or deletion.Affected Hibernate ORM versions are 5.2.8 through 5.6.15 (inclusive); earlier versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-0603"
},
{
"category": "external",
"summary": "RHBZ#2427147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427147"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-0603",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0603"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-0603",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0603"
}
],
"release_date": "2026-01-19T10:10:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4916"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.hibernate/hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection"
}
]
}
RHSA-2025:10097
Vulnerability from csaf_redhat - Published: 2025-07-01 14:30 - Updated: 2026-03-18 20:51A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.
A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.
A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.17. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10097",
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10097.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.17 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:20+00:00",
"generator": {
"date": "2026-03-18T20:51:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:10097",
"initial_release_date": "2025-07-01T14:30:33+00:00",
"revision_history": [
{
"date": "2025-07-01T14:30:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T14:30:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.17",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.17::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750851690-3.el9.src",
"product": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.src",
"product_id": "jenkins-0:2.504.2.1750851690-3.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750851690-3.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"product": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"product_id": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.17.1750851950-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"product_id": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750851690-3.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"product_id": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.17.1750851950-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src"
},
"product_reference": "jenkins-0:2.504.2.1750851690-3.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
},
"product_reference": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:10104
Vulnerability from csaf_redhat - Published: 2025-07-01 14:56 - Updated: 2026-03-18 20:51A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.
A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.
A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.15. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10104",
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10104.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.15 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:21+00:00",
"generator": {
"date": "2026-03-18T20:51:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:10104",
"initial_release_date": "2025-07-01T14:56:03+00:00",
"revision_history": [
{
"date": "2025-07-01T14:56:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T14:56:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.15",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.15::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750856366-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750856366-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750856366-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.15.1750856638-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750856366-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.15.1750856638-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750856366-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:12282
Vulnerability from csaf_redhat - Published: 2025-07-30 09:45 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Core part of Jackson that defines Streaming API as well as basic shared abstractions.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12282",
"url": "https://access.redhat.com/errata/RHSA-2025:12282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12282.json"
}
],
"title": "Red Hat Security Advisory: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:24+00:00",
"generator": {
"date": "2026-03-18T20:51:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:12282",
"initial_release_date": "2025-07-30T09:45:07+00:00",
"revision_history": [
{
"date": "2025-07-30T09:45:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T09:45:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-core-0:2.19.1-1.el9_2.src",
"product_id": "jackson-core-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-databind-0:2.19.1-1.el9_2.src",
"product_id": "jackson-databind-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.el9_2.src",
"product_id": "jackson-modules-base-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-annotations-0:2.19.1-1.el9_2.src",
"product_id": "jackson-annotations-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.el9_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-core@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-databind@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-json-provider@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-providers@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-module-jaxb-annotations@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-annotations@2.19.1-1.el9_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-annotations-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-core-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-databind-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-core-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T09:45:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12282"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:10092
Vulnerability from csaf_redhat - Published: 2025-07-01 13:48 - Updated: 2026-03-18 20:51A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.
A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.
A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat Product OCP \nTools 4.18. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10092",
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10092.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.18 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:22+00:00",
"generator": {
"date": "2026-03-18T20:51:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:10092",
"initial_release_date": "2025-07-01T13:48:03+00:00",
"revision_history": [
{
"date": "2025-07-01T13:48:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T13:48:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.18",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.18::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750846524-3.el9.src",
"product": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.src",
"product_id": "jenkins-0:2.504.2.1750846524-3.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750846524-3.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"product": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"product_id": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.18.1750846854-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"product_id": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750846524-3.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"product_id": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.18.1750846854-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src"
},
"product_reference": "jenkins-0:2.504.2.1750846524-3.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
},
"product_reference": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2026:4917
Vulnerability from csaf_redhat - Published: 2026-03-18 13:19 - Updated: 2026-03-18 20:51A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.
A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.
A flaw was found in Eclipse JGit. This vulnerability can allow information disclosure, denial of service, and other security issues when parsing XML files.
A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application's database, resulting in an application level denial of service.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.24 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.23, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.24 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\n* undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF [eap-7.4.z] (CVE-2025-12543)\n\n* cxf: CXF JMS Code Execution Vulnerability [eap-7.4.z] (CVE-2025-48913)\n\n* netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-55163)\n\n* org.eclipse.jgit: XXE vulnerability in Eclipse JGit [eap-7.4.z] (CVE-2025-4949)\n\n* hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection [eap-7.4.z] (CVE-2026-0603)\n\n* com.google.protobuf/protobuf-java: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)\n\n* undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded [eap-7.4.z] (CVE-2024-3884)\n\n* undertow-core: Undertow MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-9784)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:4917",
"url": "https://access.redhat.com/errata/RHSA-2026:4917"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2275287",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275287"
},
{
"category": "external",
"summary": "2313454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454"
},
{
"category": "external",
"summary": "2367730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367730"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "2387221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387221"
},
{
"category": "external",
"summary": "2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "2392306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392306"
},
{
"category": "external",
"summary": "2408784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408784"
},
{
"category": "external",
"summary": "2427147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427147"
},
{
"category": "external",
"summary": "JBEAP-30076",
"url": "https://issues.redhat.com/browse/JBEAP-30076"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_4917.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.24 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:14+00:00",
"generator": {
"date": "2026-03-18T20:51:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:4917",
"initial_release_date": "2026-03-18T13:19:11+00:00",
"revision_history": [
{
"date": "2026-03-18T13:19:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-18T13:19:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product": {
"name": "Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_els:7.4::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.17-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"product_id": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-glassfish-jsf@2.3.14-10.SP10_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"product_id": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-4.SP2_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"product": {
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"product_id": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.15.27-1.Final_redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-elytron-web@1.9.6-2.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.27-2.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"product_id": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf@3.5.11-1.SP1_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.24-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"product_id": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-commons-beanutils@1.11.0-2.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.38-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.124-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.39-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.16-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-43.Final_redhat_00043.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.11-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"product_id": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-eclipse-jgit@5.13.5.202508271544-2.r_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"product_id": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.24-4.GA_redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.124-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-glassfish-jsf@2.3.14-10.SP10_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-4.SP2_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-validator-cdi@6.0.23-4.SP2_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.15.27-1.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.15.27-1.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-server@1.9.6-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.27-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf@3.5.11-1.SP1_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.5.11-1.SP1_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.5.11-1.SP1_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.5.11-1.SP1_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.24-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.24-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.24-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.24-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.24-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.24-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.24-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.24-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.24-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"product_id": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-commons-beanutils@1.11.0-2.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.38-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-core@5.3.38-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-envers@5.3.38-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.124-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.39-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.16-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling-river@2.0.16-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-43.Final_redhat_00043.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-43.Final_redhat_00043.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-43.Final_redhat_00043.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-client@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.15.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-eclipse-jgit@5.13.5.202508271544-2.r_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.24-4.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.24-4.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.24-4.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.24-4.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.24-4.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.24-4.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.124-1.Final_redhat_00001.1.el9eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.124-1.Final_redhat_00001.1.el9eap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src"
},
"product_reference": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 9",
"product_id": "9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3884",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-04-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275287"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates this as a Moderate impact since this requires the use of a specific form method by the server that must be externally available and the input is not sanitized by the given servlet or class implementing its use.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3884"
},
{
"category": "external",
"summary": "RHBZ#2275287",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275287"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3884"
}
],
"release_date": "2025-12-03T16:50:50+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:19:11+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4917"
},
{
"category": "workaround",
"details": "It is possible to mitigate the vulnerability by performing an upper-level verification to ensure the content size sent server side is within the allowed parameters.",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-09-19T01:20:29.981665+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2313454"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "protobuf: StackOverflow vulnerability in Protocol Buffers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.\n\nThe protobuf package as shipped in RHEL does not include the affected java or kotlin bindings, therefore RHEL is Not Affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7254"
},
{
"category": "external",
"summary": "RHBZ#2313454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254"
},
{
"category": "external",
"summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa",
"url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa"
}
],
"release_date": "2024-09-19T01:15:10.963000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:19:11+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4917"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "protobuf: StackOverflow vulnerability in Protocol Buffers"
},
{
"cve": "CVE-2025-4949",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2025-05-21T07:00:48.762597+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2367730"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse JGit. This vulnerability can allow information disclosure, denial of service, and other security issues when parsing XML files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.eclipse.jgit: XXE vulnerability in Eclipse JGit",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. A flaw in Eclipse JGit allows for XML External Entity (XXE) attacks when parsing specially crafted XML files. This can lead to local denial of service in affected Red Hat products that utilize JGit\u0027s ManifestParser or AmazonS3 class for git transport. The current 9.8 rating by NVD assumes a default, server-side exploitation path. However, the vulnerability resides in the experimental AmazonS3 transport class within Eclipse JGit, which is not enabled by default and requires non-standard configuration (Attack Complexity: High). Furthermore, exploitation typically occurs via client-side tools (e.g., repo) requiring active user participation (User Interaction: Required), limiting the primary risk to local Denial of Service rather than remote, unauthenticated compromise (Availability: High).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4949"
},
{
"category": "external",
"summary": "RHBZ#2367730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367730"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4949",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4949"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/64",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/64"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281",
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281"
},
{
"category": "external",
"summary": "https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1",
"url": "https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1"
}
],
"release_date": "2025-05-21T06:47:19.777000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:19:11+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4917"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.eclipse.jgit: XXE vulnerability in Eclipse JGit"
},
{
"cve": "CVE-2025-9784",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-01T06:19:20.938000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2392306"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the \"MadeYouReset\" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Undertow MadeYouReset HTTP/2 DDoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a Denial of Service (DoS). While some DoS flaws are classified as Moderate, \u201cMadeYouReset\u201d is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling \u2014 malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9784"
},
{
"category": "external",
"summary": "RHBZ#2392306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9784"
},
{
"category": "external",
"summary": "https://github.com/undertow-io/undertow/pull/1778",
"url": "https://github.com/undertow-io/undertow/pull/1778"
},
{
"category": "external",
"summary": "https://github.com/undertow-io/undertow/releases/tag/2.2.38.Final",
"url": "https://github.com/undertow-io/undertow/releases/tag/2.2.38.Final"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/UNDERTOW-2598",
"url": "https://issues.redhat.com/browse/UNDERTOW-2598"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/767506",
"url": "https://kb.cert.org/vuls/id/767506"
}
],
"release_date": "2025-09-01T06:21:54.614000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:19:11+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4917"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undertow: Undertow MadeYouReset HTTP/2 DDoS Vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Ahmet Artu\u00e7"
]
}
],
"cve": "CVE-2025-12543",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-10-31T06:15:35.424000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an Important severity because it can be remotely exploited without authentication. However, limited user interaction is required for full impact. It could allow attackers to hijack additional accounts, steal credentials, or gain access to internal systems. The issue stems from improper input validation of HTTP Host headers, leading to serious breaches in confidentiality and integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12543"
},
{
"category": "external",
"summary": "RHBZ#2408784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12543"
}
],
"release_date": "2026-01-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:19:11+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4917"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use, applicability, or stability.",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF"
},
{
"cve": "CVE-2025-48913",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-08-08T10:00:54.007824+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2387221"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw should be considered Important because the impact goes beyond a simple denial of service or configuration misuse. By allowing untrusted users to configure JMS with RMI or LDAP URLs, attackers could achieve remote code execution by loading attacker-controlled classes or objects. Although this requires the precondition that the attacker has access to JMS configuration, in many enterprise deployments this may be exposed through integration layers or misconfigured permissions, making the attack surface broader than a purely local or limited-scope scenario.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48913"
},
{
"category": "external",
"summary": "RHBZ#2387221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48913"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83",
"url": "https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83"
}
],
"release_date": "2025-08-08T09:21:22.208000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:19:11+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4917"
},
{
"category": "workaround",
"details": "To reduce risk, deployments should restrict the allowed protocols in JMS configuration to trusted and expected values only. In particular, disallow the use of rmi:// and ldap:// URLs, which could be abused for remote class loading and code execution.",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:19:11+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4917"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-08-13T15:01:55.372237+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2388252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the \"MadeYouReset\" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a denial of service (DoS). While some DoS flaws are classified as Moderate, \u201cMadeYouReset\u201d is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling \u2014 malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55163"
},
{
"category": "external",
"summary": "RHBZ#2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4",
"url": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/767506",
"url": "https://kb.cert.org/vuls/id/767506"
}
],
"release_date": "2025-08-13T14:17:36.111000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:19:11+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4917"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Christiaan Swiers"
],
"organization": "YouGina"
},
{
"names": [
"Tommy Williams"
],
"organization": "HeroDevs"
}
],
"cve": "CVE-2026-0603",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2026-01-05T13:12:29.816000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427147"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application\u0027s database, resulting in an application level denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.hibernate/hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows a remote attacker with low privileges to perform second-order SQL injection in applications using Hibernate\u0027s InlineIdsOrClauseBuilder with unsanitized non-alphanumeric characters in the ID column. This could lead to sensitive information disclosure and data manipulation or deletion.Affected Hibernate ORM versions are 5.2.8 through 5.6.15 (inclusive); earlier versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-0603"
},
{
"category": "external",
"summary": "RHBZ#2427147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427147"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-0603",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0603"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-0603",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0603"
}
],
"release_date": "2026-01-19T10:10:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:19:11+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4917"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk17-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.hibernate/hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection"
}
]
}
RHSA-2025:12281
Vulnerability from csaf_redhat - Published: 2025-07-30 09:53 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Core part of Jackson that defines Streaming API as well as basic shared abstractions.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12281",
"url": "https://access.redhat.com/errata/RHSA-2025:12281"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12281.json"
}
],
"title": "Red Hat Security Advisory: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:24+00:00",
"generator": {
"date": "2026-03-18T20:51:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:12281",
"initial_release_date": "2025-07-30T09:53:38+00:00",
"revision_history": [
{
"date": "2025-07-30T09:53:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T09:53:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-core-0:2.19.1-1.el9_4.src",
"product_id": "jackson-core-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.el9_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-databind-0:2.19.1-1.el9_4.src",
"product_id": "jackson-databind-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.el9_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-annotations-0:2.19.1-1.el9_4.src",
"product_id": "jackson-annotations-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.el9_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.el9_4.src",
"product_id": "jackson-modules-base-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.el9_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-core@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-databind@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-annotations@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-module-jaxb-annotations@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-json-provider@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-providers@2.19.1-1.el9_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-annotations-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-core-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-databind-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-core-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T09:53:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12281"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:11473
Vulnerability from csaf_redhat - Published: 2025-07-21 17:07 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4.\n\nSecurity Fix(es):\n\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:11473",
"url": "https://access.redhat.com/errata/RHSA-2025:11473"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11473.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:23+00:00",
"generator": {
"date": "2026-03-18T20:51:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:11473",
"initial_release_date": "2025-07-21T17:07:33+00:00",
"revision_history": [
{
"date": "2025-07-21T17:07:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-21T17:07:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-providers@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-providers@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-providers@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el9eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-base@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-json-provider@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jdk8@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jsr310@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-base@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-json-provider@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jdk8@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jsr310@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-base@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-json-provider@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jdk8@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jsr310@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-21T17:07:33+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:11473"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2025:14116
Vulnerability from csaf_redhat - Published: 2025-08-20 00:18 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14116",
"url": "https://access.redhat.com/errata/RHSA-2025:14116"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14116.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:26+00:00",
"generator": {
"date": "2026-03-18T20:51:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:14116",
"initial_release_date": "2025-08-20T00:18:41+00:00",
"revision_history": [
{
"date": "2025-08-20T00:18:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T00:18:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-3.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-2.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-2.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-4.0-api@9.0.30-1.module%2Bel8.4.0%2B23391%2Bb488e6bf.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.30-1.module%2Bel8.4.0%2B23391%2Bb488e6bf.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-6.module%2Bel8.4.0%2B23399%2Bfc91639f?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-3.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-2.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-2.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.30-1.module%2Bel8.4.0%2B23391%2Bb488e6bf.2?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"product": {
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src (pki-deps:10.6)",
"product_id": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-6.module%2Bel8.4.0%2B23399%2Bfc91639f?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64 (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6"
},
"product_reference": "resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T00:18:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14116"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-0:3.2.2-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-0:2.6-21.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-0:3.6-3.module+el8.3.0+6805+72837426.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-0:1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-0:69-3.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-0:1.2.13-9.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-0:2.2.12-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-0:2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-0:2.19.1-2.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-0:2.19.1-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-0:2.19.2-1.module+el8.4.0+23391+b488e6bf.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-1:3.1-28.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-0:3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-1:9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-0:1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-0:2011.1-7.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-0:3.0.26-6.module+el8.4.0+23399+fc91639f.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-0:1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-0:1.7.7-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-0:1.7-24.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-0:2.7.1-38.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-0:2.11.0-34.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-0:1.4.01-25.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-0:1.2-26.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-0:1.5.4-8.module+el8.2.0+5723+4574fbff.src::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch::pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src::pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2026:4924
Vulnerability from csaf_redhat - Published: 2026-03-18 13:54 - Updated: 2026-03-18 20:51A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.
A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.
A flaw was found in Eclipse JGit. This vulnerability can allow information disclosure, denial of service, and other security issues when parsing XML files.
A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application's database, resulting in an application level denial of service.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.24 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.23, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.24 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\n* undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF [eap-7.4.z] (CVE-2025-12543)\n\n* cxf: CXF JMS Code Execution Vulnerability [eap-7.4.z] (CVE-2025-48913)\n\n* netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-55163)\n\n* org.eclipse.jgit: XXE vulnerability in Eclipse JGit [eap-7.4.z] (CVE-2025-4949)\n\n* hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection [eap-7.4.z] (CVE-2026-0603)\n\n* com.google.protobuf/protobuf-java: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)\n\n* undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded [eap-7.4.z] (CVE-2024-3884)\n\n* undertow-core: Undertow MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-9784)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:4924",
"url": "https://access.redhat.com/errata/RHSA-2026:4924"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2275287",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275287"
},
{
"category": "external",
"summary": "2313454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454"
},
{
"category": "external",
"summary": "2367730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367730"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "2387221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387221"
},
{
"category": "external",
"summary": "2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "2392306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392306"
},
{
"category": "external",
"summary": "2408784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408784"
},
{
"category": "external",
"summary": "2427147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427147"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_4924.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.24 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:15+00:00",
"generator": {
"date": "2026-03-18T20:51:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:4924",
"initial_release_date": "2026-03-18T13:54:46+00:00",
"revision_history": [
{
"date": "2026-03-18T13:54:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-18T13:54:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 7.4",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 7.4",
"product_id": "Red Hat JBoss Enterprise Application Platform 7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3884",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-04-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275287"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates this as a Moderate impact since this requires the use of a specific form method by the server that must be externally available and the input is not sanitized by the given servlet or class implementing its use.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3884"
},
{
"category": "external",
"summary": "RHBZ#2275287",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275287"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3884"
}
],
"release_date": "2025-12-03T16:50:50+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:54:46+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4924"
},
{
"category": "workaround",
"details": "It is possible to mitigate the vulnerability by performing an upper-level verification to ensure the content size sent server side is within the allowed parameters.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-09-19T01:20:29.981665+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2313454"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "protobuf: StackOverflow vulnerability in Protocol Buffers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.\n\nThe protobuf package as shipped in RHEL does not include the affected java or kotlin bindings, therefore RHEL is Not Affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7254"
},
{
"category": "external",
"summary": "RHBZ#2313454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254"
},
{
"category": "external",
"summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa",
"url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa"
}
],
"release_date": "2024-09-19T01:15:10.963000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:54:46+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4924"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "protobuf: StackOverflow vulnerability in Protocol Buffers"
},
{
"cve": "CVE-2025-4949",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2025-05-21T07:00:48.762597+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2367730"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse JGit. This vulnerability can allow information disclosure, denial of service, and other security issues when parsing XML files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.eclipse.jgit: XXE vulnerability in Eclipse JGit",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. A flaw in Eclipse JGit allows for XML External Entity (XXE) attacks when parsing specially crafted XML files. This can lead to local denial of service in affected Red Hat products that utilize JGit\u0027s ManifestParser or AmazonS3 class for git transport. The current 9.8 rating by NVD assumes a default, server-side exploitation path. However, the vulnerability resides in the experimental AmazonS3 transport class within Eclipse JGit, which is not enabled by default and requires non-standard configuration (Attack Complexity: High). Furthermore, exploitation typically occurs via client-side tools (e.g., repo) requiring active user participation (User Interaction: Required), limiting the primary risk to local Denial of Service rather than remote, unauthenticated compromise (Availability: High).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4949"
},
{
"category": "external",
"summary": "RHBZ#2367730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367730"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4949",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4949"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/64",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/64"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281",
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281"
},
{
"category": "external",
"summary": "https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1",
"url": "https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1"
}
],
"release_date": "2025-05-21T06:47:19.777000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:54:46+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4924"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.eclipse.jgit: XXE vulnerability in Eclipse JGit"
},
{
"cve": "CVE-2025-9784",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-01T06:19:20.938000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2392306"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the \"MadeYouReset\" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Undertow MadeYouReset HTTP/2 DDoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a Denial of Service (DoS). While some DoS flaws are classified as Moderate, \u201cMadeYouReset\u201d is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling \u2014 malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9784"
},
{
"category": "external",
"summary": "RHBZ#2392306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9784"
},
{
"category": "external",
"summary": "https://github.com/undertow-io/undertow/pull/1778",
"url": "https://github.com/undertow-io/undertow/pull/1778"
},
{
"category": "external",
"summary": "https://github.com/undertow-io/undertow/releases/tag/2.2.38.Final",
"url": "https://github.com/undertow-io/undertow/releases/tag/2.2.38.Final"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/UNDERTOW-2598",
"url": "https://issues.redhat.com/browse/UNDERTOW-2598"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/767506",
"url": "https://kb.cert.org/vuls/id/767506"
}
],
"release_date": "2025-09-01T06:21:54.614000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:54:46+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4924"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undertow: Undertow MadeYouReset HTTP/2 DDoS Vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Ahmet Artu\u00e7"
]
}
],
"cve": "CVE-2025-12543",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-10-31T06:15:35.424000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an Important severity because it can be remotely exploited without authentication. However, limited user interaction is required for full impact. It could allow attackers to hijack additional accounts, steal credentials, or gain access to internal systems. The issue stems from improper input validation of HTTP Host headers, leading to serious breaches in confidentiality and integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12543"
},
{
"category": "external",
"summary": "RHBZ#2408784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12543"
}
],
"release_date": "2026-01-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:54:46+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4924"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use, applicability, or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF"
},
{
"cve": "CVE-2025-48913",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-08-08T10:00:54.007824+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2387221"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw should be considered Important because the impact goes beyond a simple denial of service or configuration misuse. By allowing untrusted users to configure JMS with RMI or LDAP URLs, attackers could achieve remote code execution by loading attacker-controlled classes or objects. Although this requires the precondition that the attacker has access to JMS configuration, in many enterprise deployments this may be exposed through integration layers or misconfigured permissions, making the attack surface broader than a purely local or limited-scope scenario.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48913"
},
{
"category": "external",
"summary": "RHBZ#2387221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48913"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83",
"url": "https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83"
}
],
"release_date": "2025-08-08T09:21:22.208000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:54:46+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4924"
},
{
"category": "workaround",
"details": "To reduce risk, deployments should restrict the allowed protocols in JMS configuration to trusted and expected values only. In particular, disallow the use of rmi:// and ldap:// URLs, which could be abused for remote class loading and code execution.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:54:46+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4924"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-08-13T15:01:55.372237+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2388252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the \"MadeYouReset\" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a denial of service (DoS). While some DoS flaws are classified as Moderate, \u201cMadeYouReset\u201d is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling \u2014 malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55163"
},
{
"category": "external",
"summary": "RHBZ#2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4",
"url": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/767506",
"url": "https://kb.cert.org/vuls/id/767506"
}
],
"release_date": "2025-08-13T14:17:36.111000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:54:46+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4924"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Christiaan Swiers"
],
"organization": "YouGina"
},
{
"names": [
"Tommy Williams"
],
"organization": "HeroDevs"
}
],
"cve": "CVE-2026-0603",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2026-01-05T13:12:29.816000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427147"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application\u0027s database, resulting in an application level denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.hibernate/hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows a remote attacker with low privileges to perform second-order SQL injection in applications using Hibernate\u0027s InlineIdsOrClauseBuilder with unsanitized non-alphanumeric characters in the ID column. This could lead to sensitive information disclosure and data manipulation or deletion.Affected Hibernate ORM versions are 5.2.8 through 5.6.15 (inclusive); earlier versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-0603"
},
{
"category": "external",
"summary": "RHBZ#2427147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427147"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-0603",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0603"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-0603",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0603"
}
],
"release_date": "2026-01-19T10:10:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:54:46+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4924"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.hibernate/hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection"
}
]
}
RHSA-2025:14126
Vulnerability from csaf_redhat - Published: 2025-08-20 02:02 - Updated: 2026-03-18 20:51A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14126",
"url": "https://access.redhat.com/errata/RHSA-2025:14126"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14126.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:28+00:00",
"generator": {
"date": "2026-03-18T20:51:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2025:14126",
"initial_release_date": "2025-08-20T02:02:58+00:00",
"revision_history": [
{
"date": "2025-08-20T02:02:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T02:02:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.10.0%2B21035%2Ba01f6469?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-12.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-12.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-12.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.62-1.module%2Bel8.10.0%2B21257%2B2b5308b5?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-12.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.10.0%2B21035%2Ba01f6469?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product": {
"name": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6)",
"product_id": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src (pki-deps:10.6)",
"product_id": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.62-1.module%2Bel8.10.0%2B21257%2B2b5308b5?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product": {
"name": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6)",
"product_id": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6"
},
"product_reference": "jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
},
"product_reference": "xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T02:02:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14126"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-0:3.2.2-10.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-0:2.6-21.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-0:3.6-3.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-0:1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-0:69-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-0:1.2.13-9.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-0:2.2.12-8.module+el8.10.0+21035+a01f6469.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-0:2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-0:2.19.1-1.module+el8.10.0+23380+f6e7434b.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-1:3.1-28.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-0:3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-1:9.0.62-1.module+el8.10.0+21257+2b5308b5.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-0:2011.1-7.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-0:1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-0:1.7.7-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-0:1.7-24.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-0:2.7.1-38.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-0:2.11.0-34.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-0:1.4.01-25.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-0:1.2-26.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-0:1.5.4-8.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch::pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src::pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
RHSA-2026:4915
Vulnerability from csaf_redhat - Published: 2026-03-18 13:17 - Updated: 2026-03-18 20:51A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.
A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.
A flaw was found in Eclipse JGit. This vulnerability can allow information disclosure, denial of service, and other security issues when parsing XML files.
A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.
A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.
A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application's database, resulting in an application level denial of service.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.24 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.23, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.24 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\n* undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF [eap-7.4.z] (CVE-2025-12543)\n\n* cxf: CXF JMS Code Execution Vulnerability [eap-7.4.z] (CVE-2025-48913)\n\n* netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-55163)\n\n* org.eclipse.jgit: XXE vulnerability in Eclipse JGit [eap-7.4.z] (CVE-2025-4949)\n\n* hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection [eap-7.4.z] (CVE-2026-0603)\n\n* com.google.protobuf/protobuf-java: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)\n\n* undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded [eap-7.4.z] (CVE-2024-3884)\n\n* undertow-core: Undertow MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-9784)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:4915",
"url": "https://access.redhat.com/errata/RHSA-2026:4915"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2275287",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275287"
},
{
"category": "external",
"summary": "2313454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454"
},
{
"category": "external",
"summary": "2367730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367730"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "2387221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387221"
},
{
"category": "external",
"summary": "2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "2392306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392306"
},
{
"category": "external",
"summary": "2408784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408784"
},
{
"category": "external",
"summary": "2427147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427147"
},
{
"category": "external",
"summary": "JBEAP-30074",
"url": "https://issues.redhat.com/browse/JBEAP-30074"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_4915.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.24 security update",
"tracking": {
"current_release_date": "2026-03-18T20:51:14+00:00",
"generator": {
"date": "2026-03-18T20:51:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:4915",
"initial_release_date": "2026-03-18T13:17:52+00:00",
"revision_history": [
{
"date": "2026-03-18T13:17:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-18T13:17:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T20:51:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_els:7.4::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"product_id": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-glassfish-jsf@2.3.14-10.SP10_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.17-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"product_id": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-4.SP2_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"product": {
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"product_id": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.15.27-1.Final_redhat_00002.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.27-2.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"product_id": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf@3.5.11-1.SP1_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-elytron-web@1.9.6-2.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.24-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"product_id": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-commons-beanutils@1.11.0-2.redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.38-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.124-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.39-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.16-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-43.Final_redhat_00043.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.11-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"product_id": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-eclipse-jgit@5.13.5.202508271544-2.r_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"product_id": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.24-4.GA_redhat_00002.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.124-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-glassfish-jsf@2.3.14-10.SP10_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-4.SP2_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-validator-cdi@6.0.23-4.SP2_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.15.27-1.Final_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.15.27-1.Final_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hal-console@3.3.27-2.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf@3.5.11-1.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.5.11-1.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.5.11-1.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.5.11-1.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-server@1.9.6-2.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.24-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.24-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.24-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.24-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.24-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.24-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.24-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.24-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.24-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-commons-beanutils@1.11.0-2.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate@5.3.38-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-core@5.3.38-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-entitymanager@5.3.38-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-envers@5.3.38-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-hibernate-java8@5.3.38-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-all@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.124-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.39-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.16-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-marshalling-river@2.0.16-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-43.Final_redhat_00043.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-43.Final_redhat_00043.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-43.Final_redhat_00043.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-client@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.15.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-eclipse-jgit@5.13.5.202508271544-2.r_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.24-4.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.24-4.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.24-4.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.24-4.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.24-4.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.124-1.Final_redhat_00001.1.el7eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.124-1.Final_redhat_00001.1.el7eap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src"
},
"product_reference": "eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 ELS for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3884",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-04-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275287"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates this as a Moderate impact since this requires the use of a specific form method by the server that must be externally available and the input is not sanitized by the given servlet or class implementing its use.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-3884"
},
{
"category": "external",
"summary": "RHBZ#2275287",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275287"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-3884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3884"
}
],
"release_date": "2025-12-03T16:50:50+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:52+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4915"
},
{
"category": "workaround",
"details": "It is possible to mitigate the vulnerability by performing an upper-level verification to ensure the content size sent server side is within the allowed parameters.",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-09-19T01:20:29.981665+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2313454"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "protobuf: StackOverflow vulnerability in Protocol Buffers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.\n\nThe protobuf package as shipped in RHEL does not include the affected java or kotlin bindings, therefore RHEL is Not Affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7254"
},
{
"category": "external",
"summary": "RHBZ#2313454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254"
},
{
"category": "external",
"summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa",
"url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa"
}
],
"release_date": "2024-09-19T01:15:10.963000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:52+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4915"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "protobuf: StackOverflow vulnerability in Protocol Buffers"
},
{
"cve": "CVE-2025-4949",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2025-05-21T07:00:48.762597+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2367730"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse JGit. This vulnerability can allow information disclosure, denial of service, and other security issues when parsing XML files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.eclipse.jgit: XXE vulnerability in Eclipse JGit",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. A flaw in Eclipse JGit allows for XML External Entity (XXE) attacks when parsing specially crafted XML files. This can lead to local denial of service in affected Red Hat products that utilize JGit\u0027s ManifestParser or AmazonS3 class for git transport. The current 9.8 rating by NVD assumes a default, server-side exploitation path. However, the vulnerability resides in the experimental AmazonS3 transport class within Eclipse JGit, which is not enabled by default and requires non-standard configuration (Attack Complexity: High). Furthermore, exploitation typically occurs via client-side tools (e.g., repo) requiring active user participation (User Interaction: Required), limiting the primary risk to local Denial of Service rather than remote, unauthenticated compromise (Availability: High).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4949"
},
{
"category": "external",
"summary": "RHBZ#2367730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367730"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4949",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4949"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/64",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/64"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281",
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281"
},
{
"category": "external",
"summary": "https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1",
"url": "https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1"
}
],
"release_date": "2025-05-21T06:47:19.777000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:52+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4915"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.eclipse.jgit: XXE vulnerability in Eclipse JGit"
},
{
"cve": "CVE-2025-9784",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-01T06:19:20.938000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2392306"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the \"MadeYouReset\" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Undertow MadeYouReset HTTP/2 DDoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a Denial of Service (DoS). While some DoS flaws are classified as Moderate, \u201cMadeYouReset\u201d is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling \u2014 malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9784"
},
{
"category": "external",
"summary": "RHBZ#2392306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9784"
},
{
"category": "external",
"summary": "https://github.com/undertow-io/undertow/pull/1778",
"url": "https://github.com/undertow-io/undertow/pull/1778"
},
{
"category": "external",
"summary": "https://github.com/undertow-io/undertow/releases/tag/2.2.38.Final",
"url": "https://github.com/undertow-io/undertow/releases/tag/2.2.38.Final"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/UNDERTOW-2598",
"url": "https://issues.redhat.com/browse/UNDERTOW-2598"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/767506",
"url": "https://kb.cert.org/vuls/id/767506"
}
],
"release_date": "2025-09-01T06:21:54.614000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:52+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4915"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undertow: Undertow MadeYouReset HTTP/2 DDoS Vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Ahmet Artu\u00e7"
]
}
],
"cve": "CVE-2025-12543",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-10-31T06:15:35.424000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has an Important severity because it can be remotely exploited without authentication. However, limited user interaction is required for full impact. It could allow attackers to hijack additional accounts, steal credentials, or gain access to internal systems. The issue stems from improper input validation of HTTP Host headers, leading to serious breaches in confidentiality and integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12543"
},
{
"category": "external",
"summary": "RHBZ#2408784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12543"
}
],
"release_date": "2026-01-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:52+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4915"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use, applicability, or stability.",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF"
},
{
"cve": "CVE-2025-48913",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-08-08T10:00:54.007824+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2387221"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw should be considered Important because the impact goes beyond a simple denial of service or configuration misuse. By allowing untrusted users to configure JMS with RMI or LDAP URLs, attackers could achieve remote code execution by loading attacker-controlled classes or objects. Although this requires the precondition that the attacker has access to JMS configuration, in many enterprise deployments this may be exposed through integration layers or misconfigured permissions, making the attack surface broader than a purely local or limited-scope scenario.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48913"
},
{
"category": "external",
"summary": "RHBZ#2387221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48913"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83",
"url": "https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83"
}
],
"release_date": "2025-08-08T09:21:22.208000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:52+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4915"
},
{
"category": "workaround",
"details": "To reduce risk, deployments should restrict the allowed protocols in JMS configuration to trusted and expected values only. In particular, disallow the use of rmi:// and ldap:// URLs, which could be abused for remote class loading and code execution.",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:52+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4915"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-08-13T15:01:55.372237+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2388252"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the \"MadeYouReset\" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a denial of service (DoS). While some DoS flaws are classified as Moderate, \u201cMadeYouReset\u201d is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling \u2014 malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-55163"
},
{
"category": "external",
"summary": "RHBZ#2388252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55163"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4",
"url": "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/767506",
"url": "https://kb.cert.org/vuls/id/767506"
}
],
"release_date": "2025-08-13T14:17:36.111000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:52+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4915"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Christiaan Swiers"
],
"organization": "YouGina"
},
{
"names": [
"Tommy Williams"
],
"organization": "HeroDevs"
}
],
"cve": "CVE-2026-0603",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2026-01-05T13:12:29.816000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427147"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application\u0027s database, resulting in an application level denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.hibernate/hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it allows a remote attacker with low privileges to perform second-order SQL injection in applications using Hibernate\u0027s InlineIdsOrClauseBuilder with unsanitized non-alphanumeric characters in the ID column. This could lead to sensitive information disclosure and data manipulation or deletion.Affected Hibernate ORM versions are 5.2.8 through 5.6.15 (inclusive); earlier versions are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-0603"
},
{
"category": "external",
"summary": "RHBZ#2427147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427147"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-0603",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0603"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-0603",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0603"
}
],
"release_date": "2026-01-19T10:10:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-18T13:17:52+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4915"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-commons-beanutils-0:1.11.0-2.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-0:3.5.11-1.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-rt-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-services-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-apache-cxf-tools-0:3.5.11-1.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-eclipse-jgit-0:5.13.5.202508271544-2.r_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-elytron-web-0:1.9.6-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-glassfish-jsf-0:2.3.14-10.SP10_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hal-console-0:3.3.27-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-0:5.3.38-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-core-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-entitymanager-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-envers-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-java8-0:5.3.38-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-0:6.0.23-4.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-hibernate-validator-cdi-0:6.0.23-4.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-0:1.5.24-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-common-spi-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-api-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-core-impl-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-deployers-common-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-jdbc-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-ironjacamar-validator-0:1.5.24-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-0:2.0.16-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-marshalling-river-0:2.0.16-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-0:1.10.0-43.Final_redhat_00043.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-cli-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jboss-server-migration-core-0:1.10.0-43.Final_redhat_00043.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-jbossws-cxf-0:5.4.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-all-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-buffer-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-haproxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-http2-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-memcache-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-mqtt-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-redis-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-smtp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-socks-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-stomp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-codec-xml-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-handler-proxy-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-resolver-dns-classes-macos-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-classes-kqueue-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-epoll-debuginfo-0:4.1.124-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-native-unix-common-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-netty-transport-sctp-0:4.1.124-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-0:3.15.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-atom-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-cdi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-client-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-crypto-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jackson2-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxb-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jaxrs-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jettison-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jose-jwt-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-jsapi-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-binding-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-json-p-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-multipart-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-rxjava2-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-spring-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-validator-provider-11-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-resteasy-yaml-provider-0:3.15.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-undertow-0:2.2.39-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-undertow-server-0:1.9.6-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-0:7.4.24-4.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-0:1.15.27-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-elytron-tool-0:1.15.27-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk11-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-java-jdk8-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-javadocs-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4-ELS:eap7-wildfly-modules-0:7.4.24-4.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.hibernate/hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection"
}
]
}
NCSC-2026-0034
Vulnerability from csaf_ncscnl - Published: 2026-01-22 09:03 - Updated: 2026-01-22 09:03Recent updates address critical security vulnerabilities across various software, including Ansible, Node.js, and Golang packages, with significant fixes for ReDoS and sensitive data exposure issues.
Multiple versions of the semver package are vulnerable to Regular Expression Denial of Service (ReDoS) through the new Range function, prompting updates in various products to mitigate this risk.
Multiple Oracle products, including Utilities Application Framework, WebLogic Server, Data Integrator, and Business Intelligence Enterprise Edition, have vulnerabilities allowing unauthenticated denial of service attacks, all with a CVSS score of 7.5.
Recent updates across various AWS packages, Node.js versions, and Python libraries address security vulnerabilities, enhance functionality, and improve performance, while several vulnerability reports highlight critical issues in Oracle Communications, HPE Unified OSS Console, and the cross-spawn package.
CWE-1333 - Inefficient Regular Expression ComplexityApache Tomcat versions 11.0.0-M1 to 11.0.0-M20, 10.1.0-M1 to 10.1.24, and 9.0.13 to 9.0.89 are vulnerable to OutOfMemoryError and Denial of Service due to improper TLS handshake handling.
Multiple vulnerabilities in the path-to-regexp library and related components can lead to Denial of Service (DoS) attacks, particularly affecting Node.js applications and IBM App Connect Enterprise due to backtracking regex issues.
Multiple vulnerabilities across Oracle products and DOMPurify allow for data compromise, denial of service, and XSS attacks, with CVSS scores ranging from 6.3 to 7.3.
Oracle Database Server versions 23.4.0-23.26.0 have a vulnerability in the Fleet Patching and Provisioning component, while Eclipse Jersey versions 2.45, 3.0.16, and 3.1.9 may ignore critical SSL configurations due to a race condition.
The `qs` module's `arrayLimit` option is vulnerable to denial-of-service attacks due to its failure to enforce limits for bracket notation, allowing attackers to exploit memory exhaustion.
Recent vulnerabilities in axios, pgadmin4, and HPE software expose systems to SSRF and credential leakage, particularly through the use of absolute URLs, necessitating updates to mitigate these risks.
Multiple vulnerabilities have been identified in Oracle Financial Services and Retail products, as well as the Spring Framework, allowing unauthorized access to sensitive data and potentially leading to information disclosure.
Multiple denial-of-service vulnerabilities have been identified in Oracle Application Testing Suite, Oracle Agile PLM, Apache Commons FileUpload, and HPE IceWall Identity Manager, with CVSS scores of 7.5 for some products.
Recent updates for Apache Tomcat versions 9, 10, and 11 address the 'MadeYouReset' DoS vulnerability and other issues, with specific versions being susceptible to Denial of Service attacks from malformed client requests.
Multiple vulnerabilities in the Oracle Enterprise Data Quality product and PostgreSQL JDBC Driver allow unauthorized access and insecure authentication, with CVSS scores indicating significant risk.
Apache Tomcat versions 9.0.0.M1 to 9.0.106 have multiple vulnerabilities, including a race condition affecting HTTP/2 connections and denial of service flaws, alongside issues in Oracle Graph Server and HPE Unified OSS Console.
Multiple vulnerabilities affect Oracle Communications Unified Assurance and Oracle Business Intelligence Enterprise Edition, allowing denial of service attacks, while older jackson-core versions are prone to StackoverflowErrors when parsing nested data.
Apache Jackrabbit versions prior to 2.23.2 are vulnerable to blind XXE attacks due to an unsecured document build for loading privileges.
Apache Tika versions 1.13 to 3.2.1 have a critical XXE vulnerability, while Oracle PeopleSoft's OpenSearch component in versions 8.60 to 8.62 is also affected by an easily exploitable vulnerability.
Recent updates to Netty and Oracle Communications products address critical vulnerabilities, including the 'MadeYouReset' attack in HTTP/2, which can lead to denial of service and resource exhaustion.
Apache Tomcat versions 1.0.0-M1 to 11.0.10 are vulnerable to a directory traversal issue that may allow remote code execution if HTTP PUT requests are enabled, alongside other security vulnerabilities in HPE UOCAM.
Apache Struts versions 2.0.0 to 6.7.0 and 7.0.0 to 7.0.3 have a Denial of Service vulnerability due to file leak in multipart request processing, affecting NetApp products.
Apache Tika has multiple critical XML External Entity (XXE) injection vulnerabilities, particularly affecting PDF parsing, allowing remote attackers to exploit crafted documents for sensitive data disclosure and remote code execution.
The document outlines a vulnerability in the `create-hash` package due to inadequate input type checks, leading to potential hash state manipulation and security risks, particularly in the `cipher-base` npm package versions up to 1.0.4.
The document outlines a vulnerability in `sha.js` versions up to 2.4.11 due to insufficient input type checks, leading to potential denial of service and private key extraction risks.
A high severity XXE vulnerability in Crowd Data Center and Server version 7.1.0 has a CVSS score of 7.9, allowing authenticated attackers to access sensitive content without user interaction.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Atlassian heeft kwetsbaarheden verholpen in verschillende producten, welke gebruik maken van Oracle middle-ware producten zoals de Oracle Utilities Application Framework, WebLogic Server, Data Integrator en Business Intelligence Enterprise Edition.",
"title": "Feiten"
},
{
"category": "description",
"text": "Deze kwetsbaarheden stellen ongeauthenticeerde aanvallers in staat om een denial of service (DoS) of om zich toegang te verschaffen tot gevoelige gegevens.\nEen reeks kwetsbaarheden is afkomstig van diverse Oracle-middleware software, welke in Atlassian-producten is verwerkt. Deze kwetsbaarheden zijn verholpen in de Critical Patch Update van januari 2026 van Oracle en verwerkt in de getroffen Atlassian producten.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Atlassian heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Incomplete Cleanup",
"title": "CWE-459"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "general",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://confluence.atlassian.com/security/security-bulletin-january-20-2026-1712324819.html"
}
],
"title": "Kwetsbaarheden verholpen in Atlassian producten",
"tracking": {
"current_release_date": "2026-01-22T09:03:42.667958Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0034",
"initial_release_date": "2026-01-22T09:03:42.667958Z",
"revision_history": [
{
"date": "2026-01-22T09:03:42.667958Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Bamboo"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Bitbucket"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Confluence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "Crowd Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "Crucible"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "Fisheye"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "Jira"
}
],
"category": "vendor",
"name": "Atlassian"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3807",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "description",
"text": "Recent updates address critical security vulnerabilities across various software, including Ansible, Node.js, and Golang packages, with significant fixes for ReDoS and sensitive data exposure issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-3807 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-3807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2021-3807"
},
{
"cve": "CVE-2022-25883",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "Multiple versions of the semver package are vulnerable to Regular Expression Denial of Service (ReDoS) through the new Range function, prompting updates in various products to mitigate this risk.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-25883 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-25883.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2022-25883"
},
{
"cve": "CVE-2022-45693",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple Oracle products, including Utilities Application Framework, WebLogic Server, Data Integrator, and Business Intelligence Enterprise Edition, have vulnerabilities allowing unauthenticated denial of service attacks, all with a CVSS score of 7.5.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-45693 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-45693.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2022-45693"
},
{
"cve": "CVE-2024-21538",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "Recent updates across various AWS packages, Node.js versions, and Python libraries address security vulnerabilities, enhance functionality, and improve performance, while several vulnerability reports highlight critical issues in Oracle Communications, HPE Unified OSS Console, and the cross-spawn package.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21538 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-21538.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2024-21538"
},
{
"cve": "CVE-2024-38286",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Apache Tomcat versions 11.0.0-M1 to 11.0.0-M20, 10.1.0-M1 to 10.1.24, and 9.0.13 to 9.0.89 are vulnerable to OutOfMemoryError and Denial of Service due to improper TLS handshake handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38286 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-38286.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2024-38286"
},
{
"cve": "CVE-2024-45296",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "Multiple vulnerabilities in the path-to-regexp library and related components can lead to Denial of Service (DoS) attacks, particularly affecting Node.js applications and IBM App Connect Enterprise due to backtracking regex issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45296 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45296.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2024-45296"
},
{
"cve": "CVE-2024-45801",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle products and DOMPurify allow for data compromise, denial of service, and XSS attacks, with CVSS scores ranging from 6.3 to 7.3.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45801 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2024-45801"
},
{
"cve": "CVE-2025-12383",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Oracle Database Server versions 23.4.0-23.26.0 have a vulnerability in the Fleet Patching and Provisioning component, while Eclipse Jersey versions 2.45, 3.0.16, and 3.1.9 may ignore critical SSL configurations due to a race condition.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-12383 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-12383.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-12383"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "The `qs` module\u0027s `arrayLimit` option is vulnerable to denial-of-service attacks due to its failure to enforce limits for bracket notation, allowing attackers to exploit memory exhaustion.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-15284 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-15284.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-15284"
},
{
"cve": "CVE-2025-27152",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "Recent vulnerabilities in axios, pgadmin4, and HPE software expose systems to SSRF and credential leakage, particularly through the use of absolute URLs, necessitating updates to mitigate these risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27152 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27152.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-27152"
},
{
"cve": "CVE-2025-41249",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle Financial Services and Retail products, as well as the Spring Framework, allowing unauthorized access to sensitive data and potentially leading to information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-41249 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-41249.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-41249"
},
{
"cve": "CVE-2025-48976",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple denial-of-service vulnerabilities have been identified in Oracle Application Testing Suite, Oracle Agile PLM, Apache Commons FileUpload, and HPE IceWall Identity Manager, with CVSS scores of 7.5 for some products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48976 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-48989",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Recent updates for Apache Tomcat versions 9, 10, and 11 address the \u0027MadeYouReset\u0027 DoS vulnerability and other issues, with specific versions being susceptible to Denial of Service attacks from malformed client requests.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48989 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49146",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "description",
"text": "Multiple vulnerabilities in the Oracle Enterprise Data Quality product and PostgreSQL JDBC Driver allow unauthorized access and insecure authentication, with CVSS scores indicating significant risk.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49146 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49146.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-49146"
},
{
"cve": "CVE-2025-52434",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Apache Tomcat versions 9.0.0.M1 to 9.0.106 have multiple vulnerabilities, including a race condition affecting HTTP/2 connections and denial of service flaws, alongside issues in Oracle Graph Server and HPE Unified OSS Console.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-52434 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-52434.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-52434"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Communications Unified Assurance and Oracle Business Intelligence Enterprise Edition, allowing denial of service attacks, while older jackson-core versions are prone to StackoverflowErrors when parsing nested data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-52999 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-52999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-52999"
},
{
"cve": "CVE-2025-53689",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "description",
"text": "Apache Jackrabbit versions prior to 2.23.2 are vulnerable to blind XXE attacks due to an unsecured document build for loading privileges.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53689 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53689.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-53689"
},
{
"cve": "CVE-2025-54988",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Tika versions 1.13 to 3.2.1 have a critical XXE vulnerability, while Oracle PeopleSoft\u0027s OpenSearch component in versions 8.60 to 8.62 is also affected by an easily exploitable vulnerability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-54988 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-54988.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-54988"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Recent updates to Netty and Oracle Communications products address critical vulnerabilities, including the \u0027MadeYouReset\u0027 attack in HTTP/2, which can lead to denial of service and resource exhaustion.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55163 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-55163"
},
{
"cve": "CVE-2025-55752",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Tomcat versions 1.0.0-M1 to 11.0.10 are vulnerable to a directory traversal issue that may allow remote code execution if HTTP PUT requests are enabled, alongside other security vulnerabilities in HPE UOCAM.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55752 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55752.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-55752"
},
{
"cve": "CVE-2025-64775",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "other",
"text": "Incomplete Cleanup",
"title": "CWE-459"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Struts versions 2.0.0 to 6.7.0 and 7.0.0 to 7.0.3 have a Denial of Service vulnerability due to file leak in multipart request processing, affecting NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-64775 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-64775.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-64775"
},
{
"cve": "CVE-2025-66516",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Tika has multiple critical XML External Entity (XXE) injection vulnerabilities, particularly affecting PDF parsing, allowing remote attackers to exploit crafted documents for sensitive data disclosure and remote code execution.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-66516 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-66516.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-66516"
},
{
"cve": "CVE-2025-9287",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "The document outlines a vulnerability in the `create-hash` package due to inadequate input type checks, leading to potential hash state manipulation and security risks, particularly in the `cipher-base` npm package versions up to 1.0.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9287 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9287.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-9287"
},
{
"cve": "CVE-2025-9288",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "The document outlines a vulnerability in `sha.js` versions up to 2.4.11 due to insufficient input type checks, leading to potential denial of service and private key extraction risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9288 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9288.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
}
],
"title": "CVE-2025-9288"
},
{
"cve": "CVE-2026-21569",
"notes": [
{
"category": "description",
"text": "A high severity XXE vulnerability in Crowd Data Center and Server version 7.1.0 has a CVSS score of 7.9, allowing authenticated attackers to access sensitive content without user interaction.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21569 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21569.json"
}
],
"title": "CVE-2026-21569"
}
]
}
NCSC-2026-0028
Vulnerability from csaf_ncscnl - Published: 2026-01-21 10:10 - Updated: 2026-01-21 10:10Multiple vulnerabilities across Oracle products, including Middleware, Business Intelligence, and SOA Suite, as well as XMLBeans, expose systems to unauthorized access and denial of service, with CVSS scores ranging from 7.3 to 9.1.
Recent updates and vulnerabilities in Apache MINA SSHD, Oracle products, and Red Hat JBoss Data Grid highlight significant security risks, including unsafe Java deserialization and unauthenticated access leading to potential system compromises.
Multiple vulnerabilities across Oracle Business Intelligence, Primavera Gateway, Oracle GoldenGate, and HPE Telco Service Orchestrator allow for denial of service, with CVSS scores ranging from 2.7 to 7.5.
Multiple vulnerabilities related to out-of-bounds read and write issues in OpenSSL affect various products, with moderate severity assessments and low likelihood of successful exploitation.
Multiple vulnerabilities have been identified across various Oracle and Apache POI products, including improper input validation and unauthorized data access, affecting versions 5.4.0 and earlier, with CVSS scores of 5.3.
Multiple vulnerabilities have been identified in Oracle WebLogic Server and Oracle Communications ASAP, both allowing unauthenticated partial denial of service, alongside an uncontrolled recursion issue in Apache Commons Lang leading to potential application crashes.
Multiple vulnerabilities affect Oracle Communications Unified Assurance and Oracle Business Intelligence Enterprise Edition, allowing denial of service attacks, while older jackson-core versions are prone to StackoverflowErrors when parsing nested data.
A vulnerability in Oracle Business Intelligence Enterprise Edition (versions 7.6.0.0.0 and 8.2.0.0.0) allows low-privileged attackers to compromise the system, with a CVSS score of 7.1 indicating significant impacts on confidentiality and integrity.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in Oracle Business Intelligence Enterprise Edition.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen ongeauthenticeerde aanvallers in staat om een Denial-of-Service te veroorzaken, of kunnen leiden tot ongeautoriseerde toegang en wijziging van kritieke gegevens.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheid te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://www.oracle.com/security-alerts/cpujan2026.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Analytics",
"tracking": {
"current_release_date": "2026-01-21T10:10:15.985753Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0028",
"initial_release_date": "2026-01-21T10:10:15.985753Z",
"revision_history": [
{
"date": "2026-01-21T10:10:15.985753Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Business Intelligence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Business Intelligence Enterprise Edition"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-23926",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle products, including Middleware, Business Intelligence, and SOA Suite, as well as XMLBeans, expose systems to unauthorized access and denial of service, with CVSS scores ranging from 7.3 to 9.1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-23926 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-23926.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2021-23926"
},
{
"cve": "CVE-2022-45047",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "description",
"text": "Recent updates and vulnerabilities in Apache MINA SSHD, Oracle products, and Red Hat JBoss Data Grid highlight significant security risks, including unsafe Java deserialization and unauthenticated access leading to potential system compromises.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-45047 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-45047.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2022-45047"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Business Intelligence, Primavera Gateway, Oracle GoldenGate, and HPE Telco Service Orchestrator allow for denial of service, with CVSS scores ranging from 2.7 to 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-9230",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple vulnerabilities related to out-of-bounds read and write issues in OpenSSL affect various products, with moderate severity assessments and low likelihood of successful exploitation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9230 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9230.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2025-9230"
},
{
"cve": "CVE-2025-31672",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified across various Oracle and Apache POI products, including improper input validation and unauthorized data access, affecting versions 5.4.0 and earlier, with CVSS scores of 5.3.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31672 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31672.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2025-31672"
},
{
"cve": "CVE-2025-48924",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle WebLogic Server and Oracle Communications ASAP, both allowing unauthenticated partial denial of service, alongside an uncontrolled recursion issue in Apache Commons Lang leading to potential application crashes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2025-48924"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Communications Unified Assurance and Oracle Business Intelligence Enterprise Edition, allowing denial of service attacks, while older jackson-core versions are prone to StackoverflowErrors when parsing nested data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-52999 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-52999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2025-52999"
},
{
"cve": "CVE-2026-21976",
"notes": [
{
"category": "description",
"text": "A vulnerability in Oracle Business Intelligence Enterprise Edition (versions 7.6.0.0.0 and 8.2.0.0.0) allows low-privileged attackers to compromise the system, with a CVSS score of 7.1 indicating significant impacts on confidentiality and integrity.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21976 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2026-21976"
}
]
}
NCSC-2025-0330
Vulnerability from csaf_ncscnl - Published: 2025-10-23 13:20 - Updated: 2025-10-23 13:20Recent updates address vulnerabilities in NTP 4.2.8p17 and Oracle products, including CVE-2023-26555 related to malformed RT-11 dates and various security issues in Oracle Communications and Database systems.
Multiple vulnerabilities across various Oracle, IBM, and Protobuf products could lead to Denial of Service and unauthorized access, with significant risks identified in versions of Oracle Communications, MySQL Connector/J, and IBM WebSphere.
Multiple vulnerabilities in Oracle Communications products and the libpcap library allow high-privileged attackers to cause denial of service and NULL pointer dereference issues, with CVSS scores of 4.4 for the former.
Multiple vulnerabilities affecting Oracle Communications EAGLE LNP Application Processor, Oracle Communications Cloud Native Core Policy, and libtasn1 could lead to denial of service attacks, with CVSS scores of 5.3 for some products.
Multiple vulnerabilities across Oracle MySQL, Oracle Communications, and nghttp2 products allow remote attackers to exploit confidentiality, integrity, and availability, with varying damage ratings from medium to high.
Recent vulnerabilities in Oracle Communications Unified Assurance and Apache Guacamole could allow high-privileged attackers to compromise systems and execute arbitrary code, respectively.
Multiple vulnerabilities across Oracle products, including Communications and MySQL, as well as MIT Kerberos 5, allow for unauthorized access, denial of service, and other malicious activities, with CVSS scores reaching 9.1.
Multiple vulnerabilities across Oracle Middleware, Documaker, and Apache Commons IO components allow unauthenticated attackers to exploit denial of service risks, with CVSS scores ranging from 4.3 to 7.5.
Fluent Bit 3.1.9 has a vulnerability allowing remote Denial of Service attacks via a zero-length packet, while Oracle Communications Unified Assurance versions 6.1.0-6.1.1 can be exploited by high-privileged attackers for complete Denial of Service.
Recent vulnerabilities in Apache ZooKeeper and Oracle Communications Unified Assurance expose systems to authentication bypass and unauthorized access, allowing attackers to execute commands and access critical data.
Multiple security vulnerabilities across various Oracle products and the Netplex Json-smart library can lead to Denial of Service (DoS) due to stack exhaustion and other exploits, affecting versions 2.5.0 to 2.5.1 and specific Oracle software.
Eclipse Jetty versions 12.0.0 to 12.0.16 are vulnerable to OutOfMemoryError and denial of service attacks due to improper validation of the SETTINGS_MAX_HEADER_LIST_SIZE parameter, affecting various products including Oracle Communications EAGLE and NetApp.
Recent vulnerabilities in krb5 and MIT Kerberos implementations allow for message spoofing via MD5 checksum weaknesses, while Oracle Communications Network Analytics Data Director is susceptible to unauthorized data manipulation through SSH access.
Recent vulnerabilities in Oracle Communications Cloud Native Core and glib2 involve unauthorized access risks and buffer overflow issues, affecting multiple products with varying severity levels.
Recent updates to Python versions 3.6 through 3.13.5 address multiple security vulnerabilities, particularly in the tarfile module, while enhancing various functionalities and resolving issues related to memory management and IPv6 handling.
Vulnerabilities in Oracle Communications Cloud Native Core and glibc allow unauthenticated access and privilege escalation, with CVSS scores of 7.8, affecting confidentiality, integrity, and availability.
The 'MadeYouReset' vulnerability in HTTP/2 affects certain Jetty versions, allowing denial of service through malformed control frames, while additional vulnerabilities exist in Oracle Communications and SAP Commerce Cloud.
Recent vulnerabilities in Oracle MySQL Workbench and the libssh library expose sensitive data and allow unauthorized access, with CVSS scores indicating moderate severity.
Multiple vulnerabilities in Oracle MySQL Server and Cluster, along with libcurl's WebSocket code, allow for various denial of service attacks, with CVSS scores ranging from 4.3 to 7.5.
The juliangruber brace-expansion library has a vulnerability in versions up to 4.0.0 affecting the expand function, while Oracle Communications Unified Assurance versions 6.1.0-6.1.1 are susceptible to a partial denial of service by low-privileged attackers.
CWE-1333 - Inefficient Regular Expression ComplexityCritical vulnerabilities in Oracle Communications Cloud Native Core and SQLite versions prior to 3.50.2 expose systems to severe risks, including memory corruption and integer truncation issues.
Oracle Communications Unified Assurance has a vulnerability allowing unauthorized data access, while the on-headers middleware for Node.js has a bug affecting response header modifications in versions prior to 1.1.0.
CWE-241 - Improper Handling of Unexpected Data TypeRecent vulnerabilities in Oracle Communications Cloud Native Core and libxslt expose systems to unauthorized access and memory corruption, with significant impacts on integrity and availability.
Recent vulnerabilities in Oracle Communications Cloud Native Core Console and Jakarta Mail versions 2.0.2 and 2.2 expose systems to significant risks, including unauthorized access and SMTP Injection attacks.
Recent vulnerabilities in Oracle Enterprise Operations Monitor and GNU C library versions 2.4 to 2.41 expose systems to potential unauthorized access, memory corruption, and denial of service risks.
Bouncy Castle for Java and BCPKIX FIPS have a vulnerability allowing excessive resource allocation, while Oracle Communications Cloud Native Core Certificate Management and certain NetApp products face denial of service risks.
The curl update 8.14.1 addresses security vulnerabilities, including out-of-bounds reads, proxy cache poisoning, and a bug allowing insecure sites to override secure cookies, alongside a denial of service vulnerability in Oracle Communications Unified Inventory Management.
Multiple vulnerabilities have been identified in Oracle Communications Network Analytics Data Director and the libarchive component, affecting system integrity and availability, with CVSS scores indicating significant risks.
Node.js versions 20.x, 22.x, and 24.x have an incomplete fix for CVE-2025-23084 affecting Windows device names and the `path.join` API, while Oracle Communications' Cloud Native Environment has a non-exploitable Security-in-Depth issue.
Multiple vulnerabilities across Apache ActiveMQ and Oracle products allow for denial of service attacks due to improper validation and excessive memory allocation, affecting various versions and configurations.
Recent vulnerabilities in Oracle Middleware and Apache Commons VFS expose critical data and allow unauthorized file access, with significant risks associated with their exploitation.
OpenSSL versions 3.0.0 to 3.3.2 on PowerPC are vulnerable to a Minerva attack, while Oracle Communications Cloud Native Core Certificate Management 25.1.200 has a critical data access vulnerability, and OpenSSL 3 has addressed timing side channel issues.
Multiple vulnerabilities across Apache Kafka and Oracle applications allow unauthorized access to sensitive data, with notable SSRF risks and CVSS scores of 7.5 for Oracle products.
Multiple vulnerabilities have been identified in Oracle Java SE and libxml2, allowing for potential system compromise and denial of service, with CVSS scores of 7.5 for several issues.
Multiple vulnerabilities across Oracle Enterprise Communications Broker, OpenSSH, and HP-UX Secure Shell daemon could lead to unauthorized data access and system compromise, with varying CVSS scores and exploitation potential.
Recent vulnerabilities in Oracle Communications Unified Inventory Management and GnuTLS's certtool expose systems to denial-of-service and unauthorized data access, with significant integrity impacts and a CVSS score of 8.2 for Oracle's flaw.
Recent updates to Apache Commons BeanUtils address multiple vulnerabilities, including arbitrary code execution risks and unauthorized access to Java enum properties, affecting versions prior to 1.11.0 and 2.0.0-M2.
Recent vulnerabilities in Oracle WebLogic Server and Apache Commons Lang versions expose systems to denial of service risks, including an uncontrolled recursion flaw leading to StackOverflowErrors.
Multiple vulnerabilities affecting Oracle Application Testing Suite and Apache Commons FileUpload, including DoS risks due to insufficient multipart header limits, have been identified, with CVSS scores reaching 7.5.
Recent updates for Apache Tomcat versions 9, 10, and 11 address the 'MadeYouReset' DoS vulnerability in HTTP/2, along with various enhancements to components like Catalina and Coyote.
Recent updates for libxml2 address multiple vulnerabilities, including heap use after free and type confusion, which could lead to denial of service or crashes, alongside an Oracle vulnerability allowing unauthorized data access.
Oracle Communications Unified Assurance has a vulnerability allowing denial of service, while jackson-core versions prior to 2.15.0 can cause StackoverflowError with deeply nested data, now mitigated in version 2.15.0.
Helm v3.18.4 addresses a critical vulnerability allowing local code execution through crafted `Chart.yaml` and symlinked `Chart.lock` files during dependency updates, alongside an Oracle Communications flaw with a CVSS score of 8.6.
Recent vulnerabilities in Oracle Communications Operations Monitor and aiohttp could allow unauthorized access and data manipulation, with significant integrity impacts and request smuggling risks in affected versions.
Recent vulnerabilities in Oracle GoldenGate and Connect2id Nimbus JOSE + JWT expose systems to denial of service attacks, with CVSS scores indicating significant availability impacts due to issues with deeply nested JSON objects.
Recent vulnerabilities in Oracle Communications Cloud Native Core Automated Test Suite and Apache HTTP Server 2.4.64 expose systems to unauthorized data access and potential denial of service, with a CVSS score of 6.3 for the Oracle issue.
Recent updates to Netty address critical vulnerabilities, including the 'MadeYouReset' DDoS attack in HTTP/2, which can lead to denial of service through resource exhaustion in various affected versions.
ImageMagick has addressed critical vulnerabilities in its BMP encoder, including a 32-bit integer overflow leading to heap corruption and potential code execution, alongside other security enhancements.
Multiple vulnerabilities in decompressing decoders, including `BrotliDecoder`, and components of Oracle and HPE products can lead to denial of service through excessive buffer allocation and malformed HTTP/2 frames.
A memory amplification vulnerability in libexpat (CVE-2025-59375) allows excessive memory allocations from crafted XML input, affecting versions prior to 2.7.2, while a Security-in-Depth issue exists in Oracle Database Server's Perl component but is not exploitable.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communications producten, waaronder de Unified Assurance en Cloud Native Core.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in de Oracle Communications producten stellen kwaadwillenden in staat om ongeautoriseerde toegang te verkrijgen, wat kan leiden tot gedeeltelijke of volledige Denial-of-Service (DoS) aanvallen. Specifiek kunnen aanvallers met netwerktoegang de systemen compromitteren, wat resulteert in ongeautoriseerde toegang tot gevoelige gegevens. De CVSS-scores van deze kwetsbaarheden vari\u00ebren van 3.1 tot 9.8, wat wijst op een breed scala aan risico\u0027s, van beperkte tot ernstige impact op de vertrouwelijkheid, integriteit en beschikbaarheid van de systemen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden in zijn Communications producten te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
"title": "CWE-124"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Improper Neutralization of Input Terminators",
"title": "CWE-147"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "Improper Handling of Unexpected Data Type",
"title": "CWE-241"
},
{
"category": "general",
"text": "Unchecked Return Value",
"title": "CWE-252"
},
{
"category": "general",
"text": "Incorrect Check of Function Return Value",
"title": "CWE-253"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Highly Compressed Data (Data Amplification)",
"title": "CWE-409"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "general",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "general",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://www.oracle.com/security-alerts/cpuoct2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications producten",
"tracking": {
"current_release_date": "2025-10-23T13:20:15.363063Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0330",
"initial_release_date": "2025-10-23T13:20:15.363063Z",
"revision_history": [
{
"date": "2025-10-23T13:20:15.363063Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Management Cloud Engine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Oracle Communications Billing and Revenue Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "Oracle Communications Calendar Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Automated Test Suite"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Certificate Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core DBTier"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Repository Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Slice Selection Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Service Communication Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Unified Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "Oracle Communications Converged Charging System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "Oracle Communications Convergence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-18"
}
}
],
"category": "product_name",
"name": "Oracle Communications Convergent Charging Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-19"
}
}
],
"category": "product_name",
"name": "Oracle Communications Diameter Signaling Router"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-20"
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE Element Management System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-21"
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE LNP Application Processor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-22"
}
}
],
"category": "product_name",
"name": "Oracle Communications LSMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-23"
}
}
],
"category": "product_name",
"name": "Oracle Communications Messaging Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-24"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Analytics Data Director"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-25"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Charging and Control"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-26"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Integrity"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-27"
}
}
],
"category": "product_name",
"name": "Oracle Communications Offline Mediation Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-28"
}
}
],
"category": "product_name",
"name": "Oracle Communications Operations Monitor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-29"
}
}
],
"category": "product_name",
"name": "Oracle Communications Order and Service Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-30"
}
}
],
"category": "product_name",
"name": "Oracle Communications Pricing Design Center"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-31"
}
}
],
"category": "product_name",
"name": "Oracle Communications Service Catalog and Design"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-32"
}
}
],
"category": "product_name",
"name": "Oracle Communications Session Border Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-33"
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Assurance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-34"
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Inventory Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-35"
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Communications Broker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-36"
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Operations Monitor"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Recent updates address vulnerabilities in NTP 4.2.8p17 and Oracle products, including CVE-2023-26555 related to malformed RT-11 dates and various security issues in Oracle Communications and Database systems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple vulnerabilities across various Oracle, IBM, and Protobuf products could lead to Denial of Service and unauthorized access, with significant risks identified in versions of Oracle Communications, MySQL Connector/J, and IBM WebSphere.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-8006",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle Communications products and the libpcap library allow high-privileged attackers to cause denial of service and NULL pointer dereference issues, with CVSS scores of 4.4 for the former.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8006 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-8006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Communications EAGLE LNP Application Processor, Oracle Communications Cloud Native Core Policy, and libtasn1 could lead to denial of service attacks, with CVSS scores of 5.3 for some products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12133 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle MySQL, Oracle Communications, and nghttp2 products allow remote attackers to exploit confidentiality, integrity, and availability, with varying damage ratings from medium to high.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-35164",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Unified Assurance and Apache Guacamole could allow high-privileged attackers to compromise systems and execute arbitrary code, respectively.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35164 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-35164.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-35164"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle products, including Communications and MySQL, as well as MIT Kerberos 5, allow for unauthorized access, denial of service, and other malicious activities, with CVSS scores reaching 9.1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Middleware, Documaker, and Apache Commons IO components allow unauthenticated attackers to exploit denial of service risks, with CVSS scores ranging from 4.3 to 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-50609",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Fluent Bit 3.1.9 has a vulnerability allowing remote Denial of Service attacks via a zero-length packet, while Oracle Communications Unified Assurance versions 6.1.0-6.1.1 can be exploited by high-privileged attackers for complete Denial of Service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50609 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-50609.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-50609"
},
{
"cve": "CVE-2024-51504",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "description",
"text": "Recent vulnerabilities in Apache ZooKeeper and Oracle Communications Unified Assurance expose systems to authentication bypass and unauthorized access, allowing attackers to execute commands and access critical data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-51504 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-51504.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-51504"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple security vulnerabilities across various Oracle products and the Netplex Json-smart library can lead to Denial of Service (DoS) due to stack exhaustion and other exploits, affecting versions 2.5.0 to 2.5.1 and specific Oracle software.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Eclipse Jetty versions 12.0.0 to 12.0.16 are vulnerable to OutOfMemoryError and denial of service attacks due to improper validation of the SETTINGS_MAX_HEADER_LIST_SIZE parameter, affecting various products including Oracle Communications EAGLE and NetApp.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1948 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1948.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-1948"
},
{
"cve": "CVE-2025-3576",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "description",
"text": "Recent vulnerabilities in krb5 and MIT Kerberos implementations allow for message spoofing via MD5 checksum weaknesses, while Oracle Communications Network Analytics Data Director is susceptible to unauthorized data manipulation through SSH access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3576 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3576.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-3576"
},
{
"cve": "CVE-2025-4373",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
"title": "CWE-124"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and glib2 involve unauthorized access risks and buffer overflow issues, affecting multiple products with varying severity levels.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4373 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4373.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4373"
},
{
"cve": "CVE-2025-4517",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "Recent updates to Python versions 3.6 through 3.13.5 address multiple security vulnerabilities, particularly in the tarfile module, while enhancing various functionalities and resolving issues related to memory management and IPv6 handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4517 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4517.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4517"
},
{
"cve": "CVE-2025-4802",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "description",
"text": "Vulnerabilities in Oracle Communications Cloud Native Core and glibc allow unauthenticated access and privilege escalation, with CVSS scores of 7.8, affecting confidentiality, integrity, and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4802 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4802.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4802"
},
{
"cve": "CVE-2025-5115",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "The \u0027MadeYouReset\u0027 vulnerability in HTTP/2 affects certain Jetty versions, allowing denial of service through malformed control frames, while additional vulnerabilities exist in Oracle Communications and SAP Commerce Cloud.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5115 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5115.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5115"
},
{
"cve": "CVE-2025-5318",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle MySQL Workbench and the libssh library expose sensitive data and allow unauthorized access, with CVSS scores indicating moderate severity.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5318 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5318.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5318"
},
{
"cve": "CVE-2025-5399",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle MySQL Server and Cluster, along with libcurl\u0027s WebSocket code, allow for various denial of service attacks, with CVSS scores ranging from 4.3 to 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5399 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5399.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5399"
},
{
"cve": "CVE-2025-5889",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "The juliangruber brace-expansion library has a vulnerability in versions up to 4.0.0 affecting the expand function, while Oracle Communications Unified Assurance versions 6.1.0-6.1.1 are susceptible to a partial denial of service by low-privileged attackers.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5889 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5889.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5889"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "other",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "description",
"text": "Critical vulnerabilities in Oracle Communications Cloud Native Core and SQLite versions prior to 3.50.2 expose systems to severe risks, including memory corruption and integer truncation issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:L/U:Green",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6965 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6965.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-6965"
},
{
"cve": "CVE-2025-7339",
"cwe": {
"id": "CWE-241",
"name": "Improper Handling of Unexpected Data Type"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Unexpected Data Type",
"title": "CWE-241"
},
{
"category": "description",
"text": "Oracle Communications Unified Assurance has a vulnerability allowing unauthorized data access, while the on-headers middleware for Node.js has a bug affecting response header modifications in versions prior to 1.1.0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7339 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7339.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7339"
},
{
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and libxslt expose systems to unauthorized access and memory corruption, with significant impacts on integrity and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7425 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7425"
},
{
"cve": "CVE-2025-7962",
"cwe": {
"id": "CWE-147",
"name": "Improper Neutralization of Input Terminators"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input Terminators",
"title": "CWE-147"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core Console and Jakarta Mail versions 2.0.2 and 2.2 expose systems to significant risks, including unauthorized access and SMTP Injection attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7962 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7962.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7962"
},
{
"cve": "CVE-2025-8058",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Enterprise Operations Monitor and GNU C library versions 2.4 to 2.41 expose systems to potential unauthorized access, memory corruption, and denial of service risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8058 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-8058"
},
{
"cve": "CVE-2025-8916",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Bouncy Castle for Java and BCPKIX FIPS have a vulnerability allowing excessive resource allocation, while Oracle Communications Cloud Native Core Certificate Management and certain NetApp products face denial of service risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/S:P/R:U/RE:M/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8916 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8916.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-8916"
},
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "The curl update 8.14.1 addresses security vulnerabilities, including out-of-bounds reads, proxy cache poisoning, and a bug allowing insecure sites to override secure cookies, alongside a denial of service vulnerability in Oracle Communications Unified Inventory Management.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9086 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9086.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-9086"
},
{
"cve": "CVE-2025-25724",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"notes": [
{
"category": "other",
"text": "Unchecked Return Value",
"title": "CWE-252"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle Communications Network Analytics Data Director and the libarchive component, affecting system integrity and availability, with CVSS scores indicating significant risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25724 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25724.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-25724"
},
{
"cve": "CVE-2025-27210",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "Node.js versions 20.x, 22.x, and 24.x have an incomplete fix for CVE-2025-23084 affecting Windows device names and the `path.join` API, while Oracle Communications\u0027 Cloud Native Environment has a non-exploitable Security-in-Depth issue.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27210 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27210.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27210"
},
{
"cve": "CVE-2025-27533",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"notes": [
{
"category": "other",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Apache ActiveMQ and Oracle products allow for denial of service attacks due to improper validation and excessive memory allocation, affecting various versions and configurations.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:D/RE:M/U:Red",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27533 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27533.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27533"
},
{
"cve": "CVE-2025-27553",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Middleware and Apache Commons VFS expose critical data and allow unauthorized file access, with significant risks associated with their exploitation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27553 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27553"
},
{
"cve": "CVE-2025-27587",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "description",
"text": "OpenSSL versions 3.0.0 to 3.3.2 on PowerPC are vulnerable to a Minerva attack, while Oracle Communications Cloud Native Core Certificate Management 25.1.200 has a critical data access vulnerability, and OpenSSL 3 has addressed timing side channel issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27587 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27587.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27587"
},
{
"cve": "CVE-2025-27817",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Apache Kafka and Oracle applications allow unauthorized access to sensitive data, with notable SSRF risks and CVSS scores of 7.5 for Oracle products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27817 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27817"
},
{
"cve": "CVE-2025-32415",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle Java SE and libxml2, allowing for potential system compromise and denial of service, with CVSS scores of 7.5 for several issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32415 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32415.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32415"
},
{
"cve": "CVE-2025-32728",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Enterprise Communications Broker, OpenSSH, and HP-UX Secure Shell daemon could lead to unauthorized data access and system compromise, with varying CVSS scores and exploitation potential.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32728 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32728.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32728"
},
{
"cve": "CVE-2025-32990",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Unified Inventory Management and GnuTLS\u0027s certtool expose systems to denial-of-service and unauthorized data access, with significant integrity impacts and a CVSS score of 8.2 for Oracle\u0027s flaw.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32990 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32990"
},
{
"cve": "CVE-2025-48734",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "Recent updates to Apache Commons BeanUtils address multiple vulnerabilities, including arbitrary code execution risks and unauthorized access to Java enum properties, affecting versions prior to 1.11.0 and 2.0.0-M2.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48734 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48734.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48734"
},
{
"cve": "CVE-2025-48924",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle WebLogic Server and Apache Commons Lang versions expose systems to denial of service risks, including an uncontrolled recursion flaw leading to StackOverflowErrors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48924"
},
{
"cve": "CVE-2025-48976",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Application Testing Suite and Apache Commons FileUpload, including DoS risks due to insufficient multipart header limits, have been identified, with CVSS scores reaching 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48976 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-48989",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Recent updates for Apache Tomcat versions 9, 10, and 11 address the \u0027MadeYouReset\u0027 DoS vulnerability in HTTP/2, along with various enhancements to components like Catalina and Coyote.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48989 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent updates for libxml2 address multiple vulnerabilities, including heap use after free and type confusion, which could lead to denial of service or crashes, alongside an Oracle vulnerability allowing unauthorized data access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49796 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49796.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "Oracle Communications Unified Assurance has a vulnerability allowing denial of service, while jackson-core versions prior to 2.15.0 can cause StackoverflowError with deeply nested data, now mitigated in version 2.15.0.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-52999 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-52999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-52999"
},
{
"cve": "CVE-2025-53547",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "Helm v3.18.4 addresses a critical vulnerability allowing local code execution through crafted `Chart.yaml` and symlinked `Chart.lock` files during dependency updates, alongside an Oracle Communications flaw with a CVSS score of 8.6.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53547 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53547.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53547"
},
{
"cve": "CVE-2025-53643",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Operations Monitor and aiohttp could allow unauthorized access and data manipulation, with significant integrity impacts and request smuggling risks in affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53643 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53643.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53643"
},
{
"cve": "CVE-2025-53864",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle GoldenGate and Connect2id Nimbus JOSE + JWT expose systems to denial of service attacks, with CVSS scores indicating significant availability impacts due to issues with deeply nested JSON objects.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53864.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53864"
},
{
"cve": "CVE-2025-54090",
"cwe": {
"id": "CWE-253",
"name": "Incorrect Check of Function Return Value"
},
"notes": [
{
"category": "other",
"text": "Incorrect Check of Function Return Value",
"title": "CWE-253"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core Automated Test Suite and Apache HTTP Server 2.4.64 expose systems to unauthorized data access and potential denial of service, with a CVSS score of 6.3 for the Oracle issue.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-54090 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-54090.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-54090"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Recent updates to Netty address critical vulnerabilities, including the \u0027MadeYouReset\u0027 DDoS attack in HTTP/2, which can lead to denial of service through resource exhaustion in various affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55163 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-55163"
},
{
"cve": "CVE-2025-57803",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "ImageMagick has addressed critical vulnerabilities in its BMP encoder, including a 32-bit integer overflow leading to heap corruption and potential code execution, alongside other security enhancements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-57803 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-57803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-57803"
},
{
"cve": "CVE-2025-58057",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Highly Compressed Data (Data Amplification)",
"title": "CWE-409"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Multiple vulnerabilities in decompressing decoders, including `BrotliDecoder`, and components of Oracle and HPE products can lead to denial of service through excessive buffer allocation and malformed HTTP/2 frames.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-58057 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-58057"
},
{
"cve": "CVE-2025-59375",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "A memory amplification vulnerability in libexpat (CVE-2025-59375) allows excessive memory allocations from crafted XML input, affecting versions prior to 2.7.2, while a Security-in-Depth issue exists in Oracle Database Server\u0027s Perl component but is not exploitable.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59375 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59375.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-59375"
}
]
}
WID-SEC-W-2025-1405
Vulnerability from csaf_certbund - Published: 2025-06-25 22:00 - Updated: 2025-08-26 22:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Jackson ist eine quelloffene Bibliothek zur JSON-Verarbeitung in Java.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in FasterXML Jackson ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1405 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1405.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1405 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1405"
},
{
"category": "external",
"summary": "FasterXML GitHub Security Advisory vom 2025-06-25",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
},
{
"category": "external",
"summary": "Red Hat Bugtracker vom 2025-06-25",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10098 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10092 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10118 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10119 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10104 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10120 vom 2025-07-02",
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10097 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11474 vom 2025-07-21",
"url": "https://access.redhat.com/errata/RHSA-2025:11474"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11473 vom 2025-07-21",
"url": "https://access.redhat.com/errata/RHSA-2025:11473"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12280 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12280"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12281 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12281"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12282 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12282"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12283 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12283"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2934 vom 2025-07-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2934.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12280 vom 2025-07-31",
"url": "https://linux.oracle.com/errata/ELSA-2025-12280.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14118 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14118"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14126 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14126"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14127 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14127"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14117 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14117"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14116 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14116"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14126 vom 2025-08-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-14126.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14546 vom 2025-08-26",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-August/018456.html"
}
],
"source_lang": "en-US",
"title": "FasterXML Jackson: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-08-26T22:00:00.000+00:00",
"generator": {
"date": "2025-08-27T11:47:01.118+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1405",
"initial_release_date": "2025-06-25T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-26T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.15.0",
"product": {
"name": "FasterXML Jackson \u003c2.15.0",
"product_id": "T044863"
}
},
{
"category": "product_version",
"name": "2.15.0",
"product": {
"name": "FasterXML Jackson 2.15.0",
"product_id": "T044863-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:fasterxml:jackson:2.15.0"
}
}
}
],
"category": "product_name",
"name": "Jackson"
}
],
"category": "vendor",
"name": "FasterXML"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Developer Tools and Services 4.14",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.14",
"product_id": "T031233",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.14"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.16",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.16",
"product_id": "T044977",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.16"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.17",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.17",
"product_id": "T044978",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.17"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.18",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.18",
"product_id": "T044979",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.18"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.15",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.15",
"product_id": "T044980",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.15"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.13",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.13",
"product_id": "T044981",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.13"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.12",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.12",
"product_id": "T044982",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.12"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"product_status": {
"known_affected": [
"T044863",
"T031233",
"T044977",
"67646",
"T044979",
"T044978",
"398363",
"T004914",
"T044980",
"T044982",
"T044981"
]
},
"release_date": "2025-06-25T22:00:00.000+00:00",
"title": "CVE-2025-52999"
}
]
}
WID-SEC-W-2026-0177
Vulnerability from csaf_certbund - Published: 2026-01-20 23:00 - Updated: 2026-01-28 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Bamboo ist ein Werkzeug zur kontinuierlichen Integration und Bereitstellung, das automatisierte Builds, Tests und Freigaben in einem einzigen Arbeitsablauf verbindet.\r\nBitbucket ist ein Git-Server zur Sourcecode-Versionskontrolle.\r\nConfluence ist eine kommerzielle Wiki-Software.\r\nJira ist eine Webanwendung zur Softwareentwicklung.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira ausnutzen, um beliebigen Programmcode auszuf\u00fchren, um Sicherheitsvorkehrungen zu umgehen, um einen Denial of Service Angriff durchzuf\u00fchren, und um einen Cross-Site Scripting Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0177 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0177.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0177 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0177"
},
{
"category": "external",
"summary": "Atlassian Support Security Bulletin vom 2026-01-20",
"url": "https://confluence.atlassian.com/security/security-bulletin-january-20-2026-1712324819.html"
},
{
"category": "external",
"summary": "Deell Security Update",
"url": "https://www.dell.com/support/kbdoc/en-us/000281732/dsa-2025-075-security-update-for-dell-data-protection-advisor-for-multiple-component-vulnerabilities"
}
],
"source_lang": "en-US",
"title": "Atlassian Bamboo, Bitbucket, Confluence und Jira: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-01-28T23:00:00.000+00:00",
"generator": {
"date": "2026-01-29T07:51:12.449+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0177",
"initial_release_date": "2026-01-20T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: EUVD-2026-4913"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Data Center \u003c12.0.2",
"product": {
"name": "Atlassian Bamboo Data Center \u003c12.0.2",
"product_id": "T050227"
}
},
{
"category": "product_version",
"name": "Data Center 12.0.2",
"product": {
"name": "Atlassian Bamboo Data Center 12.0.2",
"product_id": "T050227-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:data_center__12.0.2"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c10.2.13",
"product": {
"name": "Atlassian Bamboo Data Center \u003c10.2.13",
"product_id": "T050228"
}
},
{
"category": "product_version",
"name": "Data Center 10.2.13",
"product": {
"name": "Atlassian Bamboo Data Center 10.2.13",
"product_id": "T050228-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:data_center__10.2.13"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c9.6.21",
"product": {
"name": "Atlassian Bamboo Data Center \u003c9.6.21",
"product_id": "T050229"
}
},
{
"category": "product_version",
"name": "Data Center 9.6.21",
"product": {
"name": "Atlassian Bamboo Data Center 9.6.21",
"product_id": "T050229-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:data_center__9.6.21"
}
}
}
],
"category": "product_name",
"name": "Bamboo"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Data Center \u003c10.1.1",
"product": {
"name": "Atlassian Bitbucket Data Center \u003c10.1.1",
"product_id": "T050230"
}
},
{
"category": "product_version",
"name": "Data Center 10.1.1",
"product": {
"name": "Atlassian Bitbucket Data Center 10.1.1",
"product_id": "T050230-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:data_center__10.1.1"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c9.4.15",
"product": {
"name": "Atlassian Bitbucket Data Center \u003c9.4.15",
"product_id": "T050231"
}
},
{
"category": "product_version",
"name": "Data Center 9.4.15",
"product": {
"name": "Atlassian Bitbucket Data Center 9.4.15",
"product_id": "T050231-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:data_center__9.4.15"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c8.19.26",
"product": {
"name": "Atlassian Bitbucket Data Center \u003c8.19.26",
"product_id": "T050232"
}
},
{
"category": "product_version",
"name": "Data Center 8.19.26",
"product": {
"name": "Atlassian Bitbucket Data Center 8.19.26",
"product_id": "T050232-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:data_center__8.19.26"
}
}
}
],
"category": "product_name",
"name": "Bitbucket"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Data Center \u003c10.2.2",
"product": {
"name": "Atlassian Confluence Data Center \u003c10.2.2",
"product_id": "T050233"
}
},
{
"category": "product_version",
"name": "Data Center 10.2.2",
"product": {
"name": "Atlassian Confluence Data Center 10.2.2",
"product_id": "T050233-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:data_center__10.2.2"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c9.2.13",
"product": {
"name": "Atlassian Confluence Data Center \u003c9.2.13",
"product_id": "T050234"
}
},
{
"category": "product_version",
"name": "Data Center 9.2.13",
"product": {
"name": "Atlassian Confluence Data Center 9.2.13",
"product_id": "T050234-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:data_center__9.2.13"
}
}
}
],
"category": "product_name",
"name": "Confluence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Data Center \u003c11.3.0",
"product": {
"name": "Atlassian Jira Data Center \u003c11.3.0",
"product_id": "T050235"
}
},
{
"category": "product_version",
"name": "Data Center 11.3.0",
"product": {
"name": "Atlassian Jira Data Center 11.3.0",
"product_id": "T050235-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira:data_center__11.3.0"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c11.2.1",
"product": {
"name": "Atlassian Jira Data Center \u003c11.2.1",
"product_id": "T050236"
}
},
{
"category": "product_version",
"name": "Data Center 11.2.1",
"product": {
"name": "Atlassian Jira Data Center 11.2.1",
"product_id": "T050236-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira:data_center__11.2.1"
}
}
},
{
"category": "product_version_range",
"name": "Data Center \u003c10.3.16",
"product": {
"name": "Atlassian Jira Data Center \u003c10.3.16",
"product_id": "T050237"
}
},
{
"category": "product_version",
"name": "Data Center 10.3.16",
"product": {
"name": "Atlassian Jira Data Center 10.3.16",
"product_id": "T050237-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira:data_center__10.3.16"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.12.26",
"product": {
"name": "Atlassian Jira \u003c9.12.26",
"product_id": "T050238"
}
},
{
"category": "product_version",
"name": "9.12.26",
"product": {
"name": "Atlassian Jira 9.12.26",
"product_id": "T050238-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira:9.12.26"
}
}
}
],
"category": "product_name",
"name": "Jira"
}
],
"category": "vendor",
"name": "Atlassian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c19.12",
"product": {
"name": "Dell Data Protection Advisor \u003c19.12",
"product_id": "T050283"
}
},
{
"category": "product_version",
"name": "19.12",
"product": {
"name": "Dell Data Protection Advisor 19.12",
"product_id": "T050283-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:data_protection_advisor:19.12"
}
}
}
],
"category": "product_name",
"name": "Data Protection Advisor"
}
],
"category": "vendor",
"name": "Dell"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3807",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2021-3807"
},
{
"cve": "CVE-2022-25883",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2022-25883"
},
{
"cve": "CVE-2022-45693",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2022-45693"
},
{
"cve": "CVE-2024-21538",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2024-21538"
},
{
"cve": "CVE-2024-38286",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2024-38286"
},
{
"cve": "CVE-2024-45296",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2024-45296"
},
{
"cve": "CVE-2024-45801",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2024-45801"
},
{
"cve": "CVE-2025-12383",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-12383"
},
{
"cve": "CVE-2025-15284",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-15284"
},
{
"cve": "CVE-2025-27152",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-27152"
},
{
"cve": "CVE-2025-41249",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-41249"
},
{
"cve": "CVE-2025-48976",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-48989",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49146",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-49146"
},
{
"cve": "CVE-2025-52434",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-52434"
},
{
"cve": "CVE-2025-52999",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-52999"
},
{
"cve": "CVE-2025-53689",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-53689"
},
{
"cve": "CVE-2025-54988",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-54988"
},
{
"cve": "CVE-2025-55163",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-55163"
},
{
"cve": "CVE-2025-55752",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-55752"
},
{
"cve": "CVE-2025-64775",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-64775"
},
{
"cve": "CVE-2025-66516",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-66516"
},
{
"cve": "CVE-2025-9287",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-9287"
},
{
"cve": "CVE-2025-9288",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-9288"
},
{
"cve": "CVE-2026-21569",
"product_status": {
"known_affected": [
"T050283",
"T050235",
"T050234",
"T050237",
"T050236",
"T050231",
"T050230",
"T050233",
"T050232",
"T050228",
"T050227",
"T050238",
"T050229"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2026-21569"
}
]
}
WID-SEC-W-2025-2360
Vulnerability from csaf_certbund - Published: 2025-10-21 22:00 - Updated: 2025-11-17 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Communications Applications umfasst eine Sammlung von Werkzeugen zur Verwaltung von Messaging-, Kommunikationsdiensten und -ressourcen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2360 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2360.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2360 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2360"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2025 - Appendix Oracle Communications Applications vom 2025-10-21",
"url": "https://www.oracle.com/security-alerts/cpuoct2025.html#AppendixCAGBU"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-018 vom 2025-11-18",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/11/Xerox-Security-Bulletin-XRX25-018-Xerox-FreeFlow-Print-Server-v7.pdf"
}
],
"source_lang": "en-US",
"title": "Oracle Communications Applications: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-17T23:00:00.000+00:00",
"generator": {
"date": "2025-11-18T08:13:07.419+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2360",
"initial_release_date": "2025-10-21T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=2.0.0.1.0",
"product": {
"name": "Oracle Communications Applications \u003c=2.0.0.1.0",
"product_id": "T047971"
}
},
{
"category": "product_version_range",
"name": "\u003c=2.0.0.1.0",
"product": {
"name": "Oracle Communications Applications \u003c=2.0.0.1.0",
"product_id": "T047971-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=12.0.6.0.0",
"product": {
"name": "Oracle Communications Applications \u003c=12.0.6.0.0",
"product_id": "T047972"
}
},
{
"category": "product_version_range",
"name": "\u003c=12.0.6.0.0",
"product": {
"name": "Oracle Communications Applications \u003c=12.0.6.0.0",
"product_id": "T047972-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=15.0.1.0.0",
"product": {
"name": "Oracle Communications Applications \u003c=15.0.1.0.0",
"product_id": "T047973"
}
},
{
"category": "product_version_range",
"name": "\u003c=15.0.1.0.0",
"product": {
"name": "Oracle Communications Applications \u003c=15.0.1.0.0",
"product_id": "T047973-fixed"
}
},
{
"category": "product_version",
"name": "15.1.0.0.0",
"product": {
"name": "Oracle Communications Applications 15.1.0.0.0",
"product_id": "T047974",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:15.1.0.0.0"
}
}
},
{
"category": "product_version",
"name": "8.1.0.28",
"product": {
"name": "Oracle Communications Applications 8.1.0.28",
"product_id": "T047975",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.1.0.28"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=6.1.1",
"product": {
"name": "Oracle Communications Applications \u003c=6.1.1",
"product_id": "T047976"
}
},
{
"category": "product_version_range",
"name": "\u003c=6.1.1",
"product": {
"name": "Oracle Communications Applications \u003c=6.1.1",
"product_id": "T047976-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.8.0",
"product": {
"name": "Oracle Communications Applications \u003c=7.8.0",
"product_id": "T047977"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.8.0",
"product": {
"name": "Oracle Communications Applications \u003c=7.8.0",
"product_id": "T047977-fixed"
}
},
{
"category": "product_version",
"name": "8.0.0.8.0",
"product": {
"name": "Oracle Communications Applications 8.0.0.8.0",
"product_id": "T047978",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.0.0.8.0"
}
}
},
{
"category": "product_version",
"name": "8.0.0.9.0",
"product": {
"name": "Oracle Communications Applications 8.0.0.9.0",
"product_id": "T047979",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.0.0.9.0"
}
}
},
{
"category": "product_version",
"name": "2.0.0.0.0",
"product": {
"name": "Oracle Communications Applications 2.0.0.0.0",
"product_id": "T047980",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:2.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "2.0.0.1.0",
"product": {
"name": "Oracle Communications Applications 2.0.0.1.0",
"product_id": "T047981",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:2.0.0.1.0"
}
}
},
{
"category": "product_version",
"name": "3.0.3.4.0",
"product": {
"name": "Oracle Communications Applications 3.0.3.4.0",
"product_id": "T047982",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:3.0.3.4.0"
}
}
},
{
"category": "product_version",
"name": "12.0.6.0.0",
"product": {
"name": "Oracle Communications Applications 12.0.6.0.0",
"product_id": "T047983",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:12.0.6.0.0"
}
}
},
{
"category": "product_version",
"name": "7.4.0",
"product": {
"name": "Oracle Communications Applications 7.4.0",
"product_id": "T047984",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.4.0"
}
}
},
{
"category": "product_version",
"name": "15.0.1.0.0",
"product": {
"name": "Oracle Communications Applications 15.0.1.0.0",
"product_id": "T047992",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:15.0.1.0.0"
}
}
},
{
"category": "product_version",
"name": "15.0.0.0.0",
"product": {
"name": "Oracle Communications Applications 15.0.0.0.0",
"product_id": "T047993",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:15.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "7.3.6",
"product": {
"name": "Oracle Communications Applications 7.3.6",
"product_id": "T047994",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.3.6"
}
}
},
{
"category": "product_version",
"name": "3.0.3.3.0",
"product": {
"name": "Oracle Communications Applications 3.0.3.3.0",
"product_id": "T047996",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:3.0.3.3.0"
}
}
},
{
"category": "product_version",
"name": "8.0.0.7.0",
"product": {
"name": "Oracle Communications Applications 8.0.0.7.0",
"product_id": "T047997",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.0.0.7.0"
}
}
},
{
"category": "product_version",
"name": "7.8.0",
"product": {
"name": "Oracle Communications Applications 7.8.0",
"product_id": "T047998",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.8.0"
}
}
},
{
"category": "product_version",
"name": "7.7.0",
"product": {
"name": "Oracle Communications Applications 7.7.0",
"product_id": "T047999",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.7.0"
}
}
},
{
"category": "product_version",
"name": "7.5.1",
"product": {
"name": "Oracle Communications Applications 7.5.1",
"product_id": "T048000",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.5.1"
}
}
},
{
"category": "product_version",
"name": "6.1.1",
"product": {
"name": "Oracle Communications Applications 6.1.1",
"product_id": "T048001",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:6.1.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.1",
"product": {
"name": "Oracle Communications Applications \u003c=7.5.1",
"product_id": "T048003"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.1",
"product": {
"name": "Oracle Communications Applications \u003c=7.5.1",
"product_id": "T048003-fixed"
}
},
{
"category": "product_version",
"name": "8.2.0.1.0",
"product": {
"name": "Oracle Communications Applications 8.2.0.1.0",
"product_id": "T048004",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.2.0.1.0"
}
}
},
{
"category": "product_version",
"name": "8.1.0.4.0",
"product": {
"name": "Oracle Communications Applications 8.1.0.4.0",
"product_id": "T048005",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.1.0.4.0"
}
}
},
{
"category": "product_version",
"name": "8.0.0.5.0",
"product": {
"name": "Oracle Communications Applications 8.0.0.5.0",
"product_id": "T048006",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.0.0.5.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=12.0.0.8.0",
"product": {
"name": "Oracle Communications Applications \u003c=12.0.0.8.0",
"product_id": "T048008"
}
},
{
"category": "product_version_range",
"name": "\u003c=12.0.0.8.0",
"product": {
"name": "Oracle Communications Applications \u003c=12.0.0.8.0",
"product_id": "T048008-fixed"
}
},
{
"category": "product_version",
"name": "7.5.0",
"product": {
"name": "Oracle Communications Applications 7.5.0",
"product_id": "T048009",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.5.0"
}
}
},
{
"category": "product_version",
"name": "7.4.1",
"product": {
"name": "Oracle Communications Applications 7.4.1",
"product_id": "T048010",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.4.1"
}
}
}
],
"category": "product_name",
"name": "Communications Applications"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T035098",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-12133",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-28182",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-35164",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-35164"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-50609",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50609"
},
{
"cve": "CVE-2024-51504",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-51504"
},
{
"cve": "CVE-2024-57699",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2024-7254",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-8006",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2025-27210",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-27210"
},
{
"cve": "CVE-2025-27533",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-27533"
},
{
"cve": "CVE-2025-27553",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-27553"
},
{
"cve": "CVE-2025-27817",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-27817"
},
{
"cve": "CVE-2025-32415",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-32415"
},
{
"cve": "CVE-2025-32990",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-32990"
},
{
"cve": "CVE-2025-4517",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-4517"
},
{
"cve": "CVE-2025-48734",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-48734"
},
{
"cve": "CVE-2025-48924",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-48924"
},
{
"cve": "CVE-2025-48976",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-48989",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49796",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-5115",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-5115"
},
{
"cve": "CVE-2025-52999",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-52999"
},
{
"cve": "CVE-2025-5318",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-5318"
},
{
"cve": "CVE-2025-53864",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-53864"
},
{
"cve": "CVE-2025-5399",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-5399"
},
{
"cve": "CVE-2025-54090",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-54090"
},
{
"cve": "CVE-2025-55163",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-55163"
},
{
"cve": "CVE-2025-5889",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-5889"
},
{
"cve": "CVE-2025-59375",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-59375"
},
{
"cve": "CVE-2025-6965",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-6965"
},
{
"cve": "CVE-2025-7339",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-7339"
},
{
"cve": "CVE-2025-8058",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-8058"
},
{
"cve": "CVE-2025-9086",
"product_status": {
"known_affected": [
"T048010",
"T035098",
"T047999",
"T047978",
"T047975",
"T047997",
"T048009",
"T047998",
"T047979",
"T047980",
"T047981",
"T047992",
"T048001",
"T048000",
"T047984",
"T047974",
"T047996",
"T048006",
"T047982",
"T047993",
"T048005",
"T047983",
"T047994",
"T048004"
],
"last_affected": [
"T047977",
"T047976",
"T048008",
"T048003",
"T047973",
"T047971",
"T047972"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-9086"
}
]
}
alsa-2025:14126
Vulnerability from osv_almalinux
The Public Key Infrastructure (PKI) Core contains fundamental packages required by AlmaLinux Certificate System.
Security Fix(es):
- com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "apache-commons-collections"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.2.2-10.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "apache-commons-lang"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.6-21.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "apache-commons-net"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.6-3.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "bea-stax-api"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.0-16.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fasterxml-oss-parent"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "69-1.module_el8.10.0+4034+20822525"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "glassfish-fastinfoset"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.13-9.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "glassfish-jaxb-api"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.12-8.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "glassfish-jaxb-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.11-12.module_el8.10.0+3791+e0637953"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "glassfish-jaxb-runtime"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.11-12.module_el8.10.0+3791+e0637953"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "glassfish-jaxb-txw2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.11-12.module_el8.10.0+3791+e0637953"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "jackson-annotations"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.module_el8.10.0+4034+20822525"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "jackson-bom"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.module_el8.10.0+4034+20822525"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "jackson-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.module_el8.10.0+4034+20822525"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "jackson-databind"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.module_el8.10.0+4034+20822525"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "jackson-jaxrs-json-provider"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.module_el8.10.0+4034+20822525"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "jackson-jaxrs-providers"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.module_el8.10.0+4034+20822525"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "jackson-module-jaxb-annotations"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.module_el8.10.0+4034+20822525"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "jackson-modules-base"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.module_el8.10.0+4034+20822525"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "jackson-parent"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.module_el8.10.0+4034+20822525"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "jakarta-commons-httpclient"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:3.1-28.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "javassist"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.18.1-8.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "javassist-javadoc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.18.1-8.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "pki-servlet-engine"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:9.0.62-1.module_el8.10.0+3791+e0637953"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "relaxngDatatype"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2011.1-7.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "slf4j"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.7.25-4.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "slf4j-jdk14"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.7.25-4.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "stax-ex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.7.7-8.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "velocity"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.7-24.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xalan-j2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.1-38.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xerces-j2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.11.0-34.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xml-commons-apis"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.01-25.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xml-commons-resolver"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2-26.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xmlstreambuffer"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.5.4-8.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xsom"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0-19.20110809svn.module_el8.5.0+2577+9e95fe00"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by AlmaLinux Certificate System. \n\nSecurity Fix(es): \n\n * com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:14126",
"modified": "2025-08-20T12:28:21Z",
"published": "2025-08-20T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:14126"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2374804"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2025-14126.html"
}
],
"related": [
"CVE-2025-52999"
],
"summary": "Important: pki-deps:10.6 security update"
}
alsa-2025:12280
Vulnerability from osv_almalinux
Core part of Jackson that defines Streaming API as well as basic shared abstractions.
Security Fix(es):
- com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "pki-jackson-annotations"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "pki-jackson-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "pki-jackson-databind"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "pki-jackson-jaxrs-json-provider"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "pki-jackson-jaxrs-providers"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "pki-jackson-module-jaxb-annotations"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.1-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Core part of Jackson that defines Streaming API as well as basic shared abstractions. \n\nSecurity Fix(es): \n\n * com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:12280",
"modified": "2025-08-09T13:24:27Z",
"published": "2025-07-30T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:12280"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2374804"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2025-12280.html"
}
],
"related": [
"CVE-2025-52999"
],
"summary": "Important: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update"
}
BDU:2025-11087
Vulnerability from fstec - Published: 25.06.2025{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CVSS 4.0": "AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, FasterXML, LLC, \u0410\u041e \u00ab\u0421\u0431\u0435\u0440\u0422\u0435\u0445\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7.3 (\u0420\u0415\u0414 \u041e\u0421), \u0434\u043e 2.15.0 (jackson-core), 9.1 (Platform V SberLinux OS Server)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3\n\n\u0414\u043b\u044f \u0420\u0415\u0414 \u041e\u0421:\nhttps://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-databind-cve-2025-52999-cve-2025-49128/?sphrase_id=1313876",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "25.06.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "07.10.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "14.09.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-11087",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-52999",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "\u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), jackson-core, Platform V SberLinux OS Server (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211618785)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0410\u041e \u00ab\u0421\u0431\u0435\u0440\u0422\u0435\u0445\u00bb Platform V SberLinux OS Server 9.1 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211618785)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 jackson-core \u043f\u0440\u043e\u0435\u043a\u0442\u0430 FasterXML, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0441\u0442\u0435\u043a\u0435 (CWE-121)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 jackson-core \u043f\u0440\u043e\u0435\u043a\u0442\u0430 FasterXML \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u0441\u0442\u0435\u043a\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3\nhttps://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-jackson-databind-cve-2025-52999-cve-2025-49128/?sphrase_id=1313876",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-121",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,3)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS 4.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,7)"
}
FKIE_CVE-2025-52999
Vulnerability from fkie_nvd - Published: 2025-06-25 17:15 - Updated: 2025-06-26 18:57| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "jackson-core contains core low-level incremental (\"streaming\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources."
},
{
"lang": "es",
"value": "jackson-core contiene las abstracciones principales del analizador incremental (\"streaming\") de bajo nivel y del generador utilizadas por Jackson Data Processor. En versiones anteriores a la 2.15.0, si un usuario analiza un archivo de entrada con datos profundamente anidados, Jackson pod\u00eda generar un error de Stackoverflow si la profundidad era excesiva. jackson-core 2.15.0 incluye un l\u00edmite configurable para la profundidad que Jackson recorrer\u00e1 en un documento de entrada, con una profundidad predeterminada de 1000. jackson-core generar\u00e1 una excepci\u00f3n StreamConstraintsException si se alcanza el l\u00edmite. jackson-databind tambi\u00e9n se beneficia de este cambio, ya que utiliza jackson-core para analizar las entradas JSON. Como soluci\u00f3n alternativa, se recomienda a los usuarios evitar analizar archivos de entrada de fuentes no confiables."
}
],
"id": "CVE-2025-52999",
"lastModified": "2025-06-26T18:57:43.670",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-06-25T17:15:39.820",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
GHSA-H46C-H94J-95F3
Vulnerability from github – Published: 2025-06-27 15:22 – Updated: 2025-06-27 15:22Impact
With older versions of jackson-core, if you parse an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large.
Patches
jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. Change is in https://github.com/FasterXML/jackson-core/pull/943. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs.
Workarounds
Users should avoid parsing input files from untrusted sources.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "com.fasterxml.jackson.core:jackson-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.15.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-52999"
],
"database_specific": {
"cwe_ids": [
"CWE-121"
],
"github_reviewed": true,
"github_reviewed_at": "2025-06-27T15:22:22Z",
"nvd_published_at": "2025-06-25T17:15:39Z",
"severity": "HIGH"
},
"details": "### Impact\nWith older versions of jackson-core, if you parse an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large.\n\n### Patches\njackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. Change is in https://github.com/FasterXML/jackson-core/pull/943. jackson-core will throw a StreamConstraintsException if the limit is reached.\njackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs.\n\n### Workarounds\nUsers should avoid parsing input files from untrusted sources.",
"id": "GHSA-h46c-h94j-95f3",
"modified": "2025-06-27T15:22:22Z",
"published": "2025-06-27T15:22:22Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"type": "WEB",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"type": "PACKAGE",
"url": "https://github.com/FasterXML/jackson-core"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "jackson-core can throw a StackoverflowError when processing deeply nested data"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.